A malicious hacker, Alex, has developed a deceptive website with the intent of harvesting users' credentials. which action does Alex need to execute to ensure that individuals are rerouted to the fraudulent site upon entering the domain name of a legitimate one?