A technician receives an email stating that the company’s network administrators are attempting to
validate the complexity of login passwords by requesting that users provide the password in a
reply email. Which of following actions should the technician take?

A.
Encrypt the reply and send the reply to the requestor.
B.
Deny the request by deleting the email.
C.
Send a reply message containing the password.
D.
Send a reply message with an encrypted signature attached.