A help desk technician receives an email from the Chief Information Officer (CIO) asking for documents. The
technician knows the CIO is on vacation for a few weeks. Which of the following should the technician do to
validate the authenticity of the email?
A. Check the metadata in the email header of the received path in reverse order to follow the email's path.
B. Hover the mouse over "From:" display name to verify the email address.
C. Look at the metadata in the email header and verify the "From:" line matches the CIO's email address.
D. Forward the email to the CIO and ask if the CIO sent the email requesting the documents.
technician knows the CIO is on vacation for a few weeks. Which of the following should the technician do to
validate the authenticity of the email?
A. Check the metadata in the email header of the received path in reverse order to follow the email's path.
B. Hover the mouse over "From:" display name to verify the email address.
C. Look at the metadata in the email header and verify the "From:" line matches the CIO's email address.
D. Forward the email to the CIO and ask if the CIO sent the email requesting the documents.