PracticeBlogFlashcardsEspañol

Acronyms and Command-Line Tool Quick Table

Key Takeaways

  • Acronyms are easier to retain when tied to where they appear in a troubleshooting workflow.
  • Command-line tools map to layers: local configuration, name resolution, path testing, port testing, and packet inspection.
  • Use ipconfig, ifconfig, or ip to verify local addressing before chasing remote services.
  • Use ping and traceroute carefully because ICMP may be blocked even when applications work.
  • Use nslookup or dig for DNS, arp for local neighbor mapping, and netstat or ss for listening ports and sessions.
Last updated: April 2026

Acronyms and Command-Line Tools

Network+ acronym questions are usually scenario questions in disguise. A prompt may not ask "What does DHCP mean?" Instead, it may say a client has APIPA and ask which service or tool to check.

Acronym Quick Table

AcronymMeaningFast association
ACLAccess control listPermit or deny traffic
APAccess pointWireless network device
ARPAddress Resolution ProtocolIPv4-to-MAC mapping on a local network
BGPBorder Gateway ProtocolInternet and external routing
CIDRClassless Inter-Domain RoutingPrefix notation such as /24
DHCPDynamic Host Configuration ProtocolAutomatic IP address assignment
DNSDomain Name SystemNames to IP addresses
FHRPFirst Hop Redundancy ProtocolGateway redundancy concept
HSRPHot Standby Router ProtocolCisco gateway redundancy protocol
IDSIntrusion detection systemAlerts on suspicious activity
IPSIntrusion prevention systemBlocks or prevents suspicious activity
LDAPLightweight Directory Access ProtocolDirectory queries
MTUMaximum transmission unitLargest frame or packet payload size before fragmentation behavior matters
NACNetwork access controlPlaces users or devices based on identity or posture
NATNetwork Address TranslationAddress translation, often private to public
NTPNetwork Time ProtocolTime synchronization
OSPFOpen Shortest Path FirstLink-state interior routing
PoEPower over EthernetPower and data on twisted pair
RADIUSRemote Authentication Dial-In User ServiceAAA for VPN, Wi-Fi, and network access
SNMPSimple Network Management ProtocolMonitoring and device management
STPSpanning Tree ProtocolLoop prevention at Layer 2
VLANVirtual LANLayer 2 segmentation
VPNVirtual private networkEncrypted tunnel over untrusted network
VRFVirtual routing and forwardingSeparate routing tables

Command-Line Tool Table

ToolPlatformUse
ipconfigWindowsView or renew IP configuration
ifconfigLinux/macOS legacyView interface configuration
ipLinuxView and change addresses, routes, and links
pingMostBasic reachability and latency check using ICMP
tracerouteLinux/macOSPath discovery toward destination
tracertWindowsWindows path discovery
nslookupMostDNS lookup testing
digLinux/macOS and installed toolsDetailed DNS queries
arpMostView local IPv4-to-MAC neighbor cache
netstatMostConnections, listening ports, and statistics
ssLinuxModern socket statistics replacement for many netstat uses
routeMost legacyView or change routing table
netshWindowsNetwork configuration and troubleshooting
WiresharkGUIPacket capture and analysis
Packet capture CLILinux/macOS or installed toolsCapture traffic from a terminal when authorized
nmapInstalled toolPort scanning and service discovery when authorized
curlMostTest HTTP, HTTPS, and other URL-based services
sshMostSecure remote administration

Tool Selection Workflow

QuestionTool examples
Does the client have a valid IP, mask, gateway, and DNS server?ipconfig, ip addr, ip route
Does the name resolve correctly?nslookup, dig
Is the destination reachable at Layer 3 where ICMP is allowed?ping
Where does the path stop?traceroute, tracert
Is the service port open?netstat, ss, nmap when authorized, curl for web
What is actually on the wire?Packet capture CLI, Wireshark

Mini Scenarios

SymptomFirst useful tool
Windows client has no network accessipconfig /all
Linux server may have wrong default routeip route
Website fails only by namenslookup or dig
Suspected blocked HTTPS servicecurl, port test, firewall logs
Suspected duplicate IP on local LANarp table, switch MAC table

Common Traps

  • Running traceroute before checking whether the host has a valid IP configuration.
  • Assuming ping failure proves the application is down.
  • Using nmap or packet capture without authorization in a real environment.
  • Forgetting that DNS can return the wrong address even when the DNS server responds.
  • Confusing ARP for local IPv4 neighbor mapping with DNS name resolution.
  • Treating a command name as universal when flags differ by operating system.
Test Your Knowledge

Which tool is most directly used to test DNS name resolution?

A
B
C
D
Test Your Knowledge

A Linux server may have the wrong default gateway. Which command family is most appropriate?

A
B
C
D
Test Your KnowledgeMulti-Select

Which tool-to-purpose matches are correct? Select three.

Select all that apply

arp for local IPv4-to-MAC cache
traceroute or tracert for path discovery
Packet capture CLI or Wireshark for packet capture
DNS for measuring cable length directly
PoE for resolving hostnames