John, a professional hacker, is attacking an organization, where he is trying to destroy the connectivity between an AP and client to make the target unavailable to other
wireless devices.
Which of the following attacks is John performing in this case?
Submit