Watch this video on YouTube
An attacker has distributed a deepfake audio clip designed to impersonate a high-level executive. What action should be taken first to identify possible tampering?