关于“Respond and recover from a data breach”的评价
评论
Peter G. · 评论about 1 year之前
Thang N. · 评论about 1 year之前
made 80/100. Completed 6/7. #4 is the issue(limit firewall port access). Same as last time I took this exam. System is not sequentially connecting with correct answer and indication of completion. Please review and allow me to progress forward on completion of my study. Thank you
Rebecca P. · 评论about 1 year之前
Jesus R. · 评论about 1 year之前
Jesus R. · 评论about 1 year之前
MOHAN KUMAR R. · 评论about 1 year之前
MITHIN KARISHNAMOORTHY G. · 评论about 1 year之前
It was an excellent opportunity to apply my skills and knowledge, and I believe this project will be a valuable addition to my career in cybersecurity. I'm excited about the impact this experience will have on my professional growth. Thanks a lot :)
S. K. · 评论about 1 year之前
Phyo Min T. · 评论about 1 year之前
Phyo Min T. · 评论about 1 year之前
Uzziah B. · 评论about 1 year之前
made 80/100
Rebecca P. · 评论about 1 year之前
22DIT010 V. · 评论about 1 year之前
Task 3 - issues with access to buckets
Rebecca P. · 评论about 1 year之前
bem legal
Lucas C. · 评论about 1 year之前
HEMANTH L. · 评论about 1 year之前
Łukasz B. · 评论about 1 year之前
Deepika V. · 评论about 1 year之前
Antony J. · 评论about 1 year之前
22DIT077 K. · 评论about 1 year之前
Kanwaljit S. · 评论about 1 year之前
Goldy S. · 评论about 1 year之前
Shreyash D. · 评论about 1 year之前
In the section where I had to create an SSH firewall rule, it was not mentioned that it had to be named as "limit-ports". Since I'd named it as per my convenience, it caused problems in the next part where I'd to enable Logging. I'd enabled logs yet the progress indicator said that I was wrong. Later, I deleted my firewall rule & created the rule with your convention , the progress indicator was working. I would like u to address it ASAP.
Vineet P. · 评论about 1 year之前
Lakshan S. · 评论about 1 year之前
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。