关于“Respond and recover from a data breach”的评价
评论
#5 not clear: rule name was not mentioned before and RDP port had to removed to be accepted.
Antti M. · 评论about 1 year之前
ahmadou t. · 评论about 1 year之前
M.Moiz N. · 评论about 1 year之前
Nandipati S. · 评论about 1 year之前
Ethakota P. · 评论about 1 year之前
good
S.Sanjay S. · 评论about 1 year之前
RYAN HONG JIA JING _. · 评论about 1 year之前
Aitor B. · 评论about 1 year之前
RYAN HONG JIA JING _. · 评论about 1 year之前
Dadi L. · 评论about 1 year之前
karthikeya venkata sai reddy s. · 评论about 1 year之前
sravya t. · 评论about 1 year之前
Mohit R. · 评论about 1 year之前
Dadi L. · 评论about 1 year之前
Mario R. · 评论about 1 year之前
Tengo un problema en la tarea 5. lo hice varias veces hasta que salió visto en el desafío
CARLOS ALBERTO V. · 评论about 1 year之前
Good instructions
Neeraj G. · 评论about 1 year之前
the time is minimal
Mohammad Hashim M. · 评论about 1 year之前
Dashmeet S. · 评论about 1 year之前
-
22DIT036 H. · 评论about 1 year之前
ADITYA B. · 评论about 1 year之前
Juan Ruben T. · 评论about 1 year之前
Cenk O. · 评论about 1 year之前
the last question wasn't working right! someone need to check it out..
ARGENTINA G. · 评论about 1 year之前
When it asks you to enable logging in the firewall rules, it does not recognize when they are on. If you turn them off again, it recognizes the rules as on and marks them in green.
Jesús Salvador R. · 评论about 1 year之前
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。