Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed. Which of the following BEST describes the attack vector used to infect the devices?
A. Cross-site scripting
B. DNS poisoning
C. Typo squatting
D. URL hijacking
Answer: C. Typo squatting
You might also like to view...
Which recovery option would allow a user to reinstall Windows on a home computer that did not come with any Windows disc?
A) Recovery partition B) System Restore C) Safe Mode D) Virtual Machine
Which of the following commands deletes an index?
A. DELETE INDEX B. REMOVE INDEX C. UNINDEX D. DROP INDEX
Which of the following LAN layouts is one in which all microcomputers and other communications devices are connected to a central server?
A) Bus network B) Ring network C) Star network D) All of the above E) None of the above
In the figure above, the Permissions tab allows you to create a certificate that identifies who you are to the user.
Answer the following statement true (T) or false (F)