关于“Respond and recover from a data breach”的评价
正在加载…
未找到任何结果。

在 Google Cloud 控制台中运用您的技能

关于“Respond and recover from a data breach”的评价

评论

prem k. · 评论11 months之前

Surya S. · 评论11 months之前

Vinothini S. · 评论11 months之前

Rishi M. · 评论11 months之前

Karthikeyan V. · 评论11 months之前

Radha N. · 评论11 months之前

Radha N. · 评论11 months之前

Dhanumersal_ G. · 评论11 months之前

RANJITH G. · 评论11 months之前

Arun T. · 评论11 months之前

Krishnan R. · 评论11 months之前

Rocky M. · 评论11 months之前

Sivaguru S. · 评论11 months之前

MANI K. · 评论11 months之前

GR G. · 评论11 months之前

Prasanth S. · 评论11 months之前

nice lab practice

Luke A. · 评论11 months之前

Luke A. · 评论11 months之前

Andres C. · 评论11 months之前

Perfect Lab to test your knowledge of this course. BUT in Task 4: Limit firewall ports access, name of rule NOT SPECIFIED, so i create rule with name "restrict-ssh", and everything seemed to be fine, but in Task 5 when I turned on logging (I'm sure I did everything correctly), then when checking the result it gave me an incorrect result, so I created rule again with the name "limit-ports" which was specified in Task 5 (but not in Tsk4), after that the check run smoothly. What needs to be fixed: add the rule name to task 4. If it was my mistake, I am sorry. Thank you for your great and wonderful work!

Alexey T. · 评论11 months之前

Mass vel G. · 评论11 months之前

Nithish N. · 评论11 months之前

Vijaya B. · 评论11 months之前

Vaibhav T. · 评论11 months之前

ASIF BASHA K. · 评论11 months之前

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。