Problem 1: What is a Rogue Access Point (AP)? Briefly explain 2 different approaches to detect a rogue AP. In your answer ensure that you discuss whether you think a rouge AP is a security vulnerability and how may an attacker exploit a rogue AP.
Problem 2: What is WiFi Protected Setup (WPS)? Which of the following WPS methods is vulnerable? Push-button method, PIN method, Piconet method, NFC method.
Problem 3: Which one is more secure: WEP, WPA, or WPA2? Explain 2 vulnerabilities of WPA that led to the development of WPA2.
Problem 4: Discuss how Mac Address Filtering may be used to secure a wireless network against threats?
Problem 5: Briefly discuss what an Evil Twin AP attack is?
Problem 6: Near Field Communication (NFC) is used for contactless payment systems. List and briefly explain 3 different vulnerabilities for NFC.
Write in your own words.