Watch this video on YouTube
To safeguard against person-in-the-middle attacks, your company seeks to prevent unauthorized access to the Google Cloud environment via counterfeit login pages. Which security measure should be employed?