An administrator has noticed an unusual pattern where wireless clients are often disconnected from the network without user initiation. After investigation, it was observed that this is a result of an intentional act by an attacker. Which of the following is the most likely method being used by the attacker to disrupt the wireless network service?
A spectrum analysis was performed to create interference in the wireless frequencies.
ARP spoofing is utilized to redirect the wireless traffic to the attacker's device.
Rogue DHCP server is assigning incorrect networking configurations to clients.
RSSI tracking is being used to degrade wireless signal strength.
The attacker is sending deauthentication frames to clients.
Firmware updates were applied to the wireless access point to force reconnections.