An attacker Joe configures his service identifier to be the same as an access point advertised on a
billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to
drop their connections and then reconnect to Joe’s system with the same SSID. Which of the
following Best describes this type of attack?

A.
Bluejacking
B.
WPS attack
C.
Evil twin
D.
War driving
E.
Relay attack