|
1 Introduction to the Study Guide |
|
|
1 | (44) |
|
|
1 | (28) |
|
|
2 | (3) |
|
Required Software and Hardware |
|
|
5 | (2) |
|
MCSE Myth #1: Everyone Must Take Six Exams to Earn the MCSE |
|
|
7 | (2) |
|
MCP Exams in the Windows NT 4.0 MCSE Track |
|
|
9 | (1) |
|
MCP Exams in the Windows NT 3.51 MCSE Track |
|
|
9 | (1) |
|
MCSE Myth #2: Only One Year to Finish |
|
|
10 | (1) |
|
MCSE Myth #3: There's a Two-Week Wait for a Retest |
|
|
11 | (1) |
|
MCSE Myth #4: You Must Pass Exam A Before Exam B |
|
|
12 | (7) |
|
Old Exams Are Eventually Retired |
|
|
19 | (4) |
|
Prepare for Each Exam with the Free TechNet CD-ROM |
|
|
23 | (6) |
|
Install the Software and Try Each Option |
|
|
29 | (1) |
|
|
30 | (15) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Really Read the Scenario Questions! |
|
|
31 | (3) |
|
|
34 | (2) |
|
When You Arrive at the Testing Center |
|
|
36 | (9) |
|
|
45 | (18) |
|
|
45 | (3) |
|
|
48 | (13) |
|
Understanding the Transmission Control Protocol (TCP) |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Internet Control Message Protocol |
|
|
60 | (1) |
|
The Internet Group Management Protocol |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (20) |
|
|
68 | (5) |
|
Understanding the Address Classes |
|
|
73 | (8) |
|
|
77 | (2) |
|
Zero-based Host or Network IDs Not Allowed |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (2) |
|
|
83 | (70) |
|
|
83 | (6) |
|
|
84 | (3) |
|
|
87 | (1) |
|
Do I Need an IP Address? Where Do I Get One? |
|
|
88 | (1) |
|
|
89 | (10) |
|
Binary Operations Are the Same as Base 10 |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (3) |
|
One More Time Through Binary to Decimal Conversion |
|
|
98 | (1) |
|
So How Does All of This Apply to TCP/IP Subnetting? |
|
|
99 | (7) |
|
|
99 | (2) |
|
|
101 | (1) |
|
Understanding the Difference Between a Host ID and a Network ID |
|
|
102 | (1) |
|
ANDing (Local Traffic or Not Local Traffic) |
|
|
103 | (3) |
|
So What Happens When a Network Is Subnetted and the Default Subnet Mask Is Not Used? |
|
|
106 | (22) |
|
Borrowing Bits to Make Subnets |
|
|
108 | (1) |
|
Determining the Number of Hosts and Networks |
|
|
109 | (8) |
|
So, Where Do I Get My New Hosts IP Addresses? |
|
|
117 | (4) |
|
|
121 | (6) |
|
The Subnet Mask in Action |
|
|
127 | (1) |
|
|
128 | (10) |
|
Step 1: Needs Analysis Highlights |
|
|
128 | (2) |
|
Step 2: Create a Subnet Mask |
|
|
130 | (6) |
|
Step 3: Calculate the New Subnetwork IDs |
|
|
136 | (1) |
|
Step 4: List the Resulting Host IDs for Each New Subnetwork |
|
|
136 | (1) |
|
Step 5: Implement the Subnet Plan |
|
|
136 | (1) |
|
Bringing It All Together -- Practice |
|
|
137 | (1) |
|
|
138 | (12) |
|
|
138 | (2) |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (2) |
|
|
153 | (20) |
|
|
155 | (17) |
|
|
156 | (1) |
|
How Routers Use IP Addresses |
|
|
157 | (2) |
|
How Routers Use Routing Information |
|
|
159 | (2) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (4) |
|
|
168 | (1) |
|
How to Build an NT-based Router |
|
|
169 | (3) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (4) |
|
Media Access Control (MAC) Address |
|
|
173 | (3) |
|
|
174 | (1) |
|
|
175 | (1) |
|
Troubleshooting Address Resolution Problems |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (10) |
|
|
178 | (7) |
|
|
178 | (3) |
|
Fully Qualified Domain Name (FQDN) |
|
|
181 | (1) |
|
Resolving Host Names to IP Addresses |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (18) |
|
|
188 | (1) |
|
|
189 | (3) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
The Reverse Resolver File |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Installing and Configuring Microsoft DNS |
|
|
193 | (10) |
|
|
195 | (1) |
|
|
196 | (1) |
|
Primary Name Server Setup |
|
|
196 | (1) |
|
Creating Secondary Name Servers |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Creating a Reverse Lookup Zone |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
9 NetBIOS Name Resolution |
|
|
205 | (10) |
|
Typical NetBIOS Computer Names |
|
|
206 | (6) |
|
Resolving NetBIOS Names to IP Addresses |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (2) |
|
Configuring an LMHOSTS File |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (2) |
|
10 Windows Internet Name Service (WINS) |
|
|
215 | (12) |
|
|
215 | (8) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (2) |
|
11 Dynamic Host Configuration Protocol (DHCP) |
|
|
227 | (16) |
|
|
228 | (2) |
|
|
230 | (10) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (2) |
|
|
242 | (1) |
|
12 Simple Network Management Protocol (SNMP) |
|
|
243 | (10) |
|
|
244 | (2) |
|
The SNMP Management System |
|
|
244 | (1) |
|
|
245 | (1) |
|
The Management Information Base |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
Installing and Configuring SNMP |
|
|
248 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (2) |
|
|
252 | (1) |
|
13 Internetworking Microsoft TCP/IP |
|
|
253 | (10) |
|
|
254 | (6) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
Remote Access Service and TCP/IP |
|
|
259 | (1) |
|
Point-to-Point Tunneling Protocol |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (2) |
|
14 Troubleshooting Microsoft TCP/IP |
|
|
263 | (16) |
|
|
264 | (11) |
|
Step 1: Check the Network Cable |
|
|
264 | (1) |
|
Step 2: Check for a Link Light |
|
|
265 | (1) |
|
Step 3: Browse the Network |
|
|
265 | (2) |
|
Step 4: Ping the Interface |
|
|
267 | (1) |
|
Step 5: Ping the Gateway Address |
|
|
268 | (2) |
|
Step 6: Ping an Address on Another Network |
|
|
270 | (1) |
|
Step 7: Tracert to an Address on Another Network |
|
|
270 | (5) |
|
Step 8: Ping the Host Name of a Computer |
|
|
275 | (1) |
|
|
275 | (2) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
Index |
|
279 | |