Problem 1: Analyse the scenario and recommend what you would have done to keep Ed away so you could reconfigure the network.
Problem 2: Assess and devise a strategy to retrieve the password from Ed without making him feeling that he was under suspicion.