关于“Respond and recover from a data breach”的评价
正在加载…
未找到任何结果。

在 Google Cloud 控制台中运用您的技能

关于“Respond and recover from a data breach”的评价

评论

Tebogo M. · 评论over 1 year之前

Bleuenn C. · 评论over 1 year之前

David R. · 评论over 1 year之前

Bartho P. · 评论over 1 year之前

George Henrique S. · 评论over 1 year之前

José C. · 评论over 1 year之前

you have to do this lab all by yourself be prepared

Pratik P. · 评论over 1 year之前

Vaishnavi N. · 评论over 1 year之前

Task 4 does not instruct you to name the firewall rule "limit-ports", and will pass the check if it has a different name, but task 6 will fail unless the firewall rule is named "limit-ports". this should be specified in task 4 to prevent confusion, anger, and having to redo task 4 to get task 6 to complete

Kurtis S. · 评论over 1 year之前

SAISEN U. · 评论over 1 year之前

Christoph K. · 评论over 1 year之前

DEVANSHU C. · 评论over 1 year之前

Raj P. · 评论over 1 year之前

Taras O. · 评论over 1 year之前

Taras O. · 评论over 1 year之前

Dwiki E. · 评论over 1 year之前

Kevin S. · 评论over 1 year之前

Sunil K. · 评论over 1 year之前

Juanmigkel G. · 评论over 1 year之前

I was able to complete it but had to disable/re-enable task 6 (logging) multiple times

Amirul A. · 评论over 1 year之前

great

Imaduddin Amrullah M. · 评论over 1 year之前

Mendurim R. · 评论over 1 year之前

Kris H. · 评论over 1 year之前

Varun J. · 评论over 1 year之前

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。