If the website is legitimate and the attacker exploited that legitimate website, and the attacker gains access to a victim's system that visits the website, then it is a drive-by compromise.
However, if the attacker built the website, and the attacker gains access to a victim's system that visits the website, will it be called a drive-by compromise?