# 312-50v12 — Question 426

**Type:** multiple_choice
**Topics:** topic_1

## Question

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?

## Correct Answer

_See scenario._

## Explanation

Selected Answer: C
C. Hootsuite 
Like 312-50 V11 Q218
CEH BOOK V12 Module 02 P181
Conducting location search on social media sites such as Twitter, Instagram, and Facebook helps attackers to detect the geolocation of the target. This information further helps attackers to perform various social engineering and non-technical attacks. Many online tools such as Followerwonk, Hootsuite, and Meltwater are available to search for both geotagged and non-geotagged information on social media sites. Attackers search social media sites using these online tools using keywords, usernames, date, time, and so on.

**Reference:** examtopics_top_comment

---
Source: https://hiexam.net/q/eccouncil/312-50v12/426  
Practice (tracked): https://hiexam.net/study/312-50v12/practice