I feel confident I can answer this. The non-transitive nature of peered networks and the ability to centrally manage routes and firewalls are definitely relevant security characteristics.
I'm feeling pretty confident about this one. I know the best practices for ccLog usage, so I should be able to identify the two usages that should be avoided.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Quentin
3 days agoNicolette
7 days agoAlisha
10 days agoIesha
16 days agoSage
17 days ago