Which of the following statements correctly defines jamming?
a. An attacker creates false deauthentication or disassociation management frames that appear to come from another client device, causing the client to disconnect from the AP.
b. An attacker intentionally floods the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications.
c. An attacker circumvents the security protections in the company's network, accessing the network behind the firewall.
d. An attacker tries to mimic an authorized AP, so a user's mobile device such as a laptop or tablet unknowingly connects to the evil twin instead.