Copyright Goodheart-Willcox Co., Inc. 270 Principles of Cybersecurity SECTION REVIEW 8.1 Check Your Understanding 1. Convert the subnet mask of /26 to decimal. 2. Which network service converts a private IP address to a public IP address? 3. What can be used to fi nd out the owner of a website? 4. What function creates a value to ensure a frame is not corrupted or damaged? 5. Which fl ags are set in the second stage of the three-way handshake? Build Your Key Terms Vocabulary As you progress through this course, develop a personal cybersecurity glossary. This will help you build your vocabulary and prepare you for a career. Write a defi nition for each of the following terms, and add it to your cybersecurity glossary. ANDing Classless Internet Domain Resolution (CIDR) cyclical redundancy check (CRC) de facto standard global unicast address initial sequence number (ISN) Internet Assigned Numbers Authority (IANA) Internet Control Message Protocol (ICMP) Internet Corporation for Assigned Names and Numbers (ICANN) link-local address local host Media Access Control (MAC) address Network Address Translation (NAT) octet packet sniffer proprietary protocol Regional Internet Registrars (RIRs) site-local address socket subnet mask three-way handshake time to live (TTL) WHOIS