What is a rogue access point


Problem 1: What is a Rogue Access Point (AP)? Briefly explain 2 different approaches to detect a rogue AP. In your answer ensure that you discuss whether you think a rouge AP is a security vulnerability and how may an attacker exploit a rogue AP.

Problem 2: What is WiFi Protected Setup (WPS)? Which of the following WPS methods is vulnerable? Push-button method, PIN method, Piconet method, NFC method.

Problem 3: Which one is more secure: WEP, WPA, or WPA2? Explain 2 vulnerabilities of WPA that led to the development of WPA2.

Problem 4: Discuss how Mac Address Filtering may be used to secure a wireless network against threats?

Problem 5: Briefly discuss what an Evil Twin AP attack is?

Problem 6: Near Field Communication (NFC) is used for contactless payment systems. List and briefly explain 3 different vulnerabilities for NFC.

Write in your own words.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: What is a rogue access point
Reference No:- TGS03252615

Expected delivery within 24 Hours