In a private enterprise environment, an employee telephones and requests that the password be reset. A technician verifies the employee’s information and resets the password. Which of the following would be the BEST way to document this telephone call?
A.
Email the user’s new password to the user’s supervisor.
B.
Document the user’s name, telephone number, the request made and the action taken.
C.
Reset password for the employee and document the new password.
D.
Document that the user requested a password reset and that the password was reset as the user requested.