关于“Respond and recover from a data breach”的评价
正在加载…
未找到任何结果。

    关于“Respond and recover from a data breach”的评价

    2999 条评价

    Chaitanya sreya A. · 已于 2 months前审核

    Zaidan R. · 已于 2 months前审核

    Shivam K. · 已于 2 months前审核

    Ethan T. · 已于 2 months前审核

    l

    Muhammad Z. · 已于 2 months前审核

    João Pedro B. · 已于 2 months前审核

    last task always get frozen no matter how you try you will need another 2 credit in order to pass the module

    Muhammad Z. · 已于 2 months前审核

    Ambiorix S. · 已于 2 months前审核

    Blademir R. · 已于 2 months前审核

    Stefan I. · 已于 2 months前审核

    That was awesome.

    Tarran I. · 已于 2 months前审核

    super

    kavya t. · 已于 2 months前审核

    Rommuel C. · 已于 2 months前审核

    *Important missing information In step 4, you have to name your new firewall rule "limit-ports", or else you can not complete step 6. Other than that, great lab that walks you through several of the steps earlier to check if you really understood the previous lessons.

    Mayer U. · 已于 2 months前审核

    Emmanuel V. · 已于 2 months前审核

    #5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.

    Antti M. · 已于 2 months前审核

    ahmadou t. · 已于 2 months前审核

    M.Moiz N. · 已于 2 months前审核

    Nandipati S. · 已于 2 months前审核

    Ethakota P. · 已于 2 months前审核

    good

    S.Sanjay S. · 已于 2 months前审核

    RYAN HONG JIA JING _. · 已于 2 months前审核

    Aitor B. · 已于 2 months前审核

    RYAN HONG JIA JING _. · 已于 2 months前审核

    Dadi L. · 已于 2 months前审核

    我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。