During a routine security check, you receive an urgent email from what appears to be your IT department, requesting immediate access to your account credentials to resolve a security issue. The email includes a link to a login page that mimics your organization's authentication portal. What is the most appropriate course of action?
Want adaptive practice that measures your real level?