It goes in a contact log. If we assume that the contact log is in a database, then it goes on the pile with the rest of the stuff. Pen-testers and social engineering hackers' calls may also appear to be ridiculous calls.
edit: In addition to tracking incoming calls in a call log for NSA reasons. An NSA employee needs to keep that log to be able to explain their activities if they are ever audited.
edit: In addition to tracking incoming calls in a call log for NSA reasons. An NSA employee needs to keep that log to be able to explain their activities if they are ever audited.