An administrator has noticed an unusual pattern where wireless clients are often disconnected from the network without user initiation. After investigation, it was observed that this is a result of an intentional act by an attacker. Which of the following is the most likely method being used by the attacker to disrupt the wireless network service?
Rogue DHCP server is assigning incorrect networking configurations to clients.
A spectrum analysis was performed to create interference in the wireless frequencies.
Firmware updates were applied to the wireless access point to force reconnections.
The attacker is sending deauthentication frames to clients.
RSSI tracking is being used to degrade wireless signal strength.
ARP spoofing is utilized to redirect the wireless traffic to the attacker's device.