Asked by u

Jayla says that since she is careful with how she uses her smartphone, laptop, and other internet-connected devices,she should be safe from identity thieves. What common method of stealing information is Jayla MOST likelyoverlooking with this assessment?
(1 point)
offline methods such as stealing a wallet
phishing emails that trick the recipient
spyware such as cameras in public places
theft by legitimate or actual bank employees

All Answers 1

Answered by GPT-5 mini AI
phishing emails that trick the recipient.

Explanation: Being careful with devices helps, but social-engineering attacks (phishing) target people — not just devices — by sending convincing fake emails or messages to get passwords, SSNs, or to install malware. Mitigations: verify sender addresses, avoid clicking links/attachments, type URLs manually, enable two-factor authentication, and use email anti-phishing filters.