An employee receives an email from what appears to be the IT department requesting immediate access to their work account credentials for security verification. What is the most appropriate action to take?
Want adaptive practice that measures your real level?