关于“Respond and recover from a data breach”的评价
正在加载…
未找到任何结果。

    关于“Respond and recover from a data breach”的评价

    评论

    Zaidan R. · 评论2 months之前

    Shivam K. · 评论2 months之前

    Ethan T. · 评论2 months之前

    l

    Muhammad Z. · 评论2 months之前

    João Pedro B. · 评论2 months之前

    last task always get frozen no matter how you try you will need another 2 credit in order to pass the module

    Muhammad Z. · 评论2 months之前

    Ambiorix S. · 评论2 months之前

    Blademir R. · 评论2 months之前

    Stefan I. · 评论2 months之前

    That was awesome.

    Tarran I. · 评论2 months之前

    super

    kavya t. · 评论2 months之前

    Rommuel C. · 评论2 months之前

    *Important missing information In step 4, you have to name your new firewall rule "limit-ports", or else you can not complete step 6. Other than that, great lab that walks you through several of the steps earlier to check if you really understood the previous lessons.

    Mayer U. · 评论2 months之前

    Emmanuel V. · 评论2 months之前

    #5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.

    Antti M. · 评论2 months之前

    ahmadou t. · 评论2 months之前

    M.Moiz N. · 评论2 months之前

    Nandipati S. · 评论2 months之前

    Ethakota P. · 评论2 months之前

    good

    S.Sanjay S. · 评论2 months之前

    RYAN HONG JIA JING _. · 评论2 months之前

    Aitor B. · 评论2 months之前

    RYAN HONG JIA JING _. · 评论2 months之前

    Dadi L. · 评论2 months之前

    karthikeya venkata sai reddy s. · 评论2 months之前

    我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。