PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of following actions should recommend the user to take?

You are working as a technician at Certkiller .com. You receive an call from a suspicious user that
has received an email stating that the company’s network administrators are attempting to validate
the complexity of login passwords by requesting that users provide the password in a reply email.
Which of following actions should recommend the user to take?