Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transported. Which of the following BEST describes the attack vector use
d to infect the devices?
A. Cross-site scripting
B. DNS poisoning
C. Typo squatting
D. URL hijacking