An employee receives an urgent email from what appears to be the IT department requesting immediate access to their cloud storage service to resolve a system issue. The email includes a link to a login page and asks for their credentials. What is the most appropriate action to take?
Want adaptive practice that measures your real level?