Respond and recover from a data breach Reviews
1055 reviews
David R. · Reviewed 4 ay ago
Bartho P. · Reviewed 4 ay ago
George Henrique S. · Reviewed 4 ay ago
José C. · Reviewed 4 ay ago
you have to do this lab all by yourself be prepared
Pratik P. · Reviewed 4 ay ago
Vaishnavi N. · Reviewed 4 ay ago
Task 4 does not instruct you to name the firewall rule "limit-ports", and will pass the check if it has a different name, but task 6 will fail unless the firewall rule is named "limit-ports". this should be specified in task 4 to prevent confusion, anger, and having to redo task 4 to get task 6 to complete
Kurtis S. · Reviewed 4 ay ago
SAISEN U. · Reviewed 4 ay ago
Christoph K. · Reviewed 4 ay ago
DEVANSHU C. · Reviewed 4 ay ago
Adrianus Y. · Reviewed 4 ay ago
Raj P. · Reviewed 4 ay ago
Taras O. · Reviewed 4 ay ago
Taras O. · Reviewed 4 ay ago
Dwiki E. · Reviewed 4 ay ago
Kevin S. · Reviewed 4 ay ago
Sunil K. · Reviewed 4 ay ago
Juanmigkel G. · Reviewed 4 ay ago
I was able to complete it but had to disable/re-enable task 6 (logging) multiple times
Amirul A. · Reviewed 4 ay ago
great
Imaduddin Amrullah M. · Reviewed 4 ay ago
Mendurim R. · Reviewed 4 ay ago
Kris H. · Reviewed 4 ay ago
Varun J. · Reviewed 4 ay ago
Logging was buggy; needed re-enable multiple times.
Paul M. · Reviewed 4 ay ago
Prayoga S. · Reviewed 4 ay ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.