Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed.
Which of the following BEST describes the attack vector used to infect the devices?
A . Cross-site scripting
B . DNS poisoning
C . Typo squatting
D . URL hijacking
Answer: C