DMS-specific SQLi Compound SQLi Classic SQLi Blind SQLi admin See author's posts Post navigation companyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware Source code review Reviewing the firewalls configuration Data items and vulnerability scanning Interviewing employees and network engineers Which of the following algorithms is used for Kerberos encryption? User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?