Skip to content

Commit 21850e4

Browse files
Fix: last 2 links
1 parent a6cb809 commit 21850e4

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -161,8 +161,8 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
161161
| 108 | [Azure AD Connect can be used to implement hybrid identity.](#azure-ad-connect-can-be-used-to-implement-hybrid-identity)
162162
| 109 | [Hybrid identity requires the implementation of two Microsoft 365 tenants.](#hybrid-identity-requires-the-implementation-of-two-microsoft-365-tenants)
163163
| 110 | [Hybrid identity refers to the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD).](#hybrid-identity-refers-to-the-synchronization-of-active-directory-domain-services-ad-ds-and-azure-active-directory-azure-ad)
164-
| 111 | [use encryption to protect data at rest.](#use-encryption-to-protect-data-at-rest)
165-
| 112 | [actively monitor systems to identify irregularities that might represent risks.](#actively-monitor-systems-to-identify-irregularities-that-might-represent-risks)
164+
| 111 | [Match the types of compliance score actions to the appropriate tasks. [...] Use encryption to protect data at rest.](#match-the-types-of-compliance-score-actions-to-the-appropriate-tasks--use-encryption-to-protect-data-at-rest)
165+
| 112 | [Match the types of compliance score actions to the appropriate tasks. [...] Actively monitor systems to identify irregularities that might represent risks.](#match-the-types-of-compliance-score-actions-to-the-appropriate-tasks--actively-monitor-systems-to-identify-irregularities-that-might-represent-risks)
166166
| 113 | [You can use the insider risk management solution to detect phishing scams.](#you-can-use-the-insider-risk-management-solution-to-detect-phishing-scams)
167167
| 114 | [To which type of resource can Azure Bastion provide secure access?](#to-which-type-of-resource-can-azure-bastion-provide-secure-access)
168168
| 115 | [Conditional access policies always enforce the use of multi-factor authentication (MFA).](#conditional-access-policies-always-enforce-the-use-of-multi-factor-authentication-mfa)
@@ -1118,15 +1118,15 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
11181118

11191119
**[⬆ Back to Top](#table-of-contents)**
11201120

1121-
### use encryption to protect data at rest.
1121+
### Match the types of compliance score actions to the appropriate tasks. [...] Use encryption to protect data at rest.
11221122

11231123
- [ ] Corrective.
11241124
- [ ] Detective.
11251125
- [x] Preventative.
11261126

11271127
**[⬆ Back to Top](#table-of-contents)**
11281128

1129-
### Actively monitor systems to identify irregularities that might represent risks.
1129+
### Match the types of compliance score actions to the appropriate tasks. [...] Actively monitor systems to identify irregularities that might represent risks.
11301130

11311131
- [ ] Corrective.
11321132
- [x] Detective.

0 commit comments

Comments
 (0)