An attacker Joe configures his service identifier to be as an access point advertised on a billboard. Joe then
conducts a denial of service attack against the legitimate AP causing users to drop their connections and then
reconnect to Joe’s system with the same SSID. Which of the following BEST describes this of attack?