Respond and recover from a data breach Reviews
Loading...
No results found.

Apply your skills in Google Cloud console

Respond and recover from a data breach Reviews

6631 reviews

prem k. · Reviewed 11 месяцев ago

Surya S. · Reviewed 11 месяцев ago

Vinothini S. · Reviewed 11 месяцев ago

Rishi M. · Reviewed 11 месяцев ago

Karthikeyan V. · Reviewed 11 месяцев ago

Radha N. · Reviewed 11 месяцев ago

Radha N. · Reviewed 11 месяцев ago

Dhanumersal_ G. · Reviewed 11 месяцев ago

RANJITH G. · Reviewed 11 месяцев ago

Arun T. · Reviewed 11 месяцев ago

Krishnan R. · Reviewed 11 месяцев ago

Rocky M. · Reviewed 11 месяцев ago

Sivaguru S. · Reviewed 11 месяцев ago

MANI K. · Reviewed 11 месяцев ago

GR G. · Reviewed 11 месяцев ago

Prasanth S. · Reviewed 11 месяцев ago

nice lab practice

Luke A. · Reviewed 11 месяцев ago

Luke A. · Reviewed 11 месяцев ago

Andres C. · Reviewed 11 месяцев ago

Perfect Lab to test your knowledge of this course. BUT in Task 4: Limit firewall ports access, name of rule NOT SPECIFIED, so i create rule with name "restrict-ssh", and everything seemed to be fine, but in Task 5 when I turned on logging (I'm sure I did everything correctly), then when checking the result it gave me an incorrect result, so I created rule again with the name "limit-ports" which was specified in Task 5 (but not in Tsk4), after that the check run smoothly. What needs to be fixed: add the rule name to task 4. If it was my mistake, I am sorry. Thank you for your great and wonderful work!

Alexey T. · Reviewed 11 месяцев ago

Mass vel G. · Reviewed 11 месяцев ago

Nithish N. · Reviewed 11 месяцев ago

Vijaya B. · Reviewed 11 месяцев ago

Vaibhav T. · Reviewed 11 месяцев ago

ASIF BASHA K. · Reviewed 11 месяцев ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.