关于“Respond and recover from a data breach”的评价
评论
ARBIN SABA A. · 评论10 days之前
Blademir R. · 评论10 days之前
Shyamal R. · 评论10 days之前
Great !
Carlos C. · 评论10 days之前
Steven P. · 评论10 days之前
Galakattu C. · 评论10 days之前
Chaitanya sreya A. · 评论10 days之前
Zaidan R. · 评论10 days之前
Shivam K. · 评论10 days之前
Ethan T. · 评论10 days之前
l
Muhammad Z. · 评论10 days之前
João Pedro B. · 评论10 days之前
last task always get frozen no matter how you try you will need another 2 credit in order to pass the module
Muhammad Z. · 评论10 days之前
Ambiorix S. · 评论11 days之前
Blademir R. · 评论11 days之前
Stefan I. · 评论11 days之前
That was awesome.
Tarran I. · 评论11 days之前
super
kavya t. · 评论11 days之前
Beng C. · 评论11 days之前
*Important missing information In step 4, you have to name your new firewall rule "limit-ports", or else you can not complete step 6. Other than that, great lab that walks you through several of the steps earlier to check if you really understood the previous lessons.
Mayer U. · 评论11 days之前
Emmanuel V. · 评论12 days之前
#5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.
Antti M. · 评论12 days之前
ahmadou t. · 评论12 days之前
M.Moiz N. · 评论12 days之前
Nandipati S. · 评论12 days之前
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。