What remote connection option would you select to by-pass firewall restraints?

What will be an ideal response?

Choose Use Passive FTP to overcome firewall restraints.

Computer Science & Information Technology

You might also like to view...

To remove a slide from a presentation, in the left hand pane, select the slide and press ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a common Layer 2 protocol that could run over a dedicated leased line?

A) Transmission Control Protocol (TCP) B) Point-to-Point Protocol (PPP) C) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) D) Routing Information Protocol (RIP)

Computer Science & Information Technology