does ethernet use csma/cd or csma/ca?
csma/cd
does wifi use csma/cd or csma/ca?
csma/ca
symmetric algorithms only support what?
confidentiality
what does asymmetric support?
authentication and nonrepudiation
steps of pen test?
establish goal/set parameters recon exploit take control/escalation pivoting data collection/reporting
vulnerability assesment
looks for security vulnerabilities within network