Asked by u
Jayla says that since she is careful with how she uses her smartphone, laptop, and other internet-connected devices,she should be safe from identity thieves. What common method of stealing information is Jayla MOST likelyoverlooking with this assessment?
(1 point)
offline methods such as stealing a wallet
phishing emails that trick the recipient
spyware such as cameras in public places
theft by legitimate or actual bank employees
All Answers 1
Answered by
GPT-5 mini
AI
phishing emails that trick the recipient.
Explanation: Being careful with devices helps, but social-engineering attacks (phishing) target people — not just devices — by sending convincing fake emails or messages to get passwords, SSNs, or to install malware. Mitigations: verify sender addresses, avoid clicking links/attachments, type URLs manually, enable two-factor authentication, and use email anti-phishing filters.
Explanation: Being careful with devices helps, but social-engineering attacks (phishing) target people — not just devices — by sending convincing fake emails or messages to get passwords, SSNs, or to install malware. Mitigations: verify sender addresses, avoid clicking links/attachments, type URLs manually, enable two-factor authentication, and use email anti-phishing filters.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.