[safety] An employee receives an urgent email from what appears to be the IT department requesting immediate access to their work account credentials for security updates. Which of the following actions should the employee take to ensure compliance with data protection regulations and organizational security protocols?
Want adaptive practice that measures your real level?