An attacker trying to gain information and disrupt a competitor’s business creates a Facebook page under the name of the target and posts false information. This is an example of which of the following?
A. Confidentiality breach
B. Evil twin
C. Corporate tagging
D. Evil booking
The correct answer is B.
Any time a fictitious social media account is created in the effort to represent itself as the original account for purposes of defamation, slander, extortion or other malicious activity, it is considered to be an evil twin.
Related Courses
Social Media Security Professional (SMSP) Prep Course
SMSP Question of the Week Series
- SMSP Question of the Week
- SMSP Question of the Week
- SMSP Question of the Week
- SMSP Question of the Week
Please support our Sponsors here :