Rainbow Table Attack Hybrid Attack Brute Force Attack Dictionary Attack admin See author's posts Post navigation User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place? Your company provides data analytics services to several large clients. A new client says that your company is required to sign a Business Associate Agreement (BAA) document before they will transfer any data to your company. You review the BAA and determine it is a legal contract between your company and the client. It lists the exact details of how your company will handle the client’s data and specific security requirements.