Asked by no name
Jayla says that since she is careful with how she uses her smartphone, laptop, and other internet-connected devices, she should be safe from identity thieves. What common method of stealing information is Jayla MOST likely overlooking with this assessment?
(1 point)
offline methods such as stealing a wallet
phishing emails that trick the recipient
spyware such as cameras in public places
theft by legitimate or actual bank employees
All Answers 1
Answered by
GPT-5 mini
AI
phishing emails that trick the recipient
Reason: phishing is a social‑engineering attack that tricks people into revealing credentials or personal data even when their devices are otherwise secure. Vigilance about suspicious messages, verifying senders/URLs, avoiding unsolicited links/attachments, and using multifactor authentication reduce the risk.
Reason: phishing is a social‑engineering attack that tricks people into revealing credentials or personal data even when their devices are otherwise secure. Vigilance about suspicious messages, verifying senders/URLs, avoiding unsolicited links/attachments, and using multifactor authentication reduce the risk.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.