An employee receives an email that appears to be from the company's official email address, but contains an unusual request to access a user account through a link. What action should they take to ensure system security?
Want adaptive practice that measures your real level?