ExamGecko
Question list
Search
Search

Related questions











Question 288 - 312-50v12 discussion

Report
Export

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this. James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

A.
ophcrack
Answers
A.
ophcrack
B.
Hootsuite
Answers
B.
Hootsuite
C.
VisualRoute
Answers
C.
VisualRoute
D.
HULK
Answers
D.
HULK
Suggested answer: B

Explanation:

Hootsuite may be a social media management platform that covers virtually each side of a social media manager's role.

With only one platform users area unit ready to do the easy stuff like reverend cool content and schedule posts on social media in all the high to managing team members and measure ROI.

There area unit many totally different plans to decide on from, from one user set up up to a bespoken enterprise account that's appropriate for much larger organizations.

Conducting location search on social media sites such as Twitter, Instagram, and Facebook helps attackers to detect the geolocation of the target. This information further helps attackers to perform various social engineering and non- technical attacks. Many online tools such as Followerwonk, Hootsuite, and Sysomos are available to search for both geotagged and non-geotagged information on social media sites. Attackers search social media sites using these online tools using keywords, usernames, date, time, and so on...

asked 18/09/2024
Gerson Rodrigo Menendez
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first