Normally, you wouldn't give your password or other login information to anybody. But you receive an e-mail from someone named Bob in the IT department who needs to access your login information for a scheduled internal vulnerability assessment. You should give him this information.
a. True
b. False