security-engineer video for you have observed a rise in phishing attacks targeting user accounts throughout your enterprise. You aim to deploy the Google 2-Step
You have observed a rise in phishing attacks targeting user accounts throughout your enterprise. You aim to deploy the Google 2-Step Verification (2SV) option that utilizes a cryptographic signature to authenticate a user and validate the URL of the login page. Which Google 2SV option should you employ?