b) A rogue access point is an access point that could be set up by a company's department or an individual employee. This access point usually have no security which makes it easy for hackers to get into the system.
5a) 802.11i
b) WPA2
c) AES-CCMP
d) Because it is expensive and there is no cracks with the WPA
e) WPA is no longer viewed as a safe solution because in 2009 a partial crack appeared. This means the standard was not as safe as it was before.
7a) PSK mode uses a shared key initial authentication by everyone who are allowed to use access points without the need of a central authentication server. In 802.1X, every workgroup switch acts as an authenticator. Authentication is done by central authentication server.
b) A pass phrase is used to create a shared key between access point and hosts. If pass phrase is short then it is easy to crack.
c) The pass phrase should be at least 20 characters long.
10a) This is because traveling to each access point for manual configuration would be very costly. So a centralized access point makes it so the management can fix issues from one area, saving them money.
b) Smart Access Points that can add an intelligence to every access point that allows the central management to communicate directly with the access point. Also, wireless LAN switches. This is because the management intelligence can be placed on the WLAN switch rather than in the access point themselves. Then multiple access points can connect to the WLAN switch.
c) The systems should notify the WLAN admins of failures immediately as they happen. They should provide continuous transmission-quality monitoring at all access points. They should help provide security by detecting rogue access points, evil twin access points, and other