During a routine security check, you receive an urgent email from what appears to be your IT department, requesting immediate access to your account credentials to resolve a system issue. The email contains a link to a login page and mentions a security breach that requires your immediate attention. What is the most appropriate action to take?
Want adaptive practice that measures your real level?