Chapter 3. Implementation
1.
Choose an administrative plan to meet specified needs, including performance
management, account management, and security.
2.
Choose a disaster recovery plan for various situations.
3.
Given the manufacturer's documentation for the network adapter, install,
configure, and resolve hardware conflicts for multiple network adapters
in a token-ring or Ethernet network.
4.
Implement a NetBIOS naming scheme for all computers on a given network.
5.
Select the appropriate hardware and software tools to monitor trends in
the network.