An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look
like an access point and advertises the same network as the coffee shop normally does. Which of the following
describes this type of attack?