Chapter 3. Implementation

1. Choose an administrative plan to meet specified needs, including performance management, account management, and security.
2. Choose a disaster recovery plan for various situations.
3. Given the manufacturer's documentation for the network adapter, install, configure, and resolve hardware conflicts for multiple network adapters in a token-ring or Ethernet network.
4. Implement a NetBIOS naming scheme for all computers on a given network.
5. Select the appropriate hardware and software tools to monitor trends in the network.