A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP Address. Which of the following is the technician's BEST course of action?
A. irect the caller to stop by the help desk in person and hang up declining any further requests from the caller
B. sk for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone
C. rite down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer
D. equest the caller send an email for identity verification and provide the requested information via email to the caller