A malicious attacker is using an inexpensive directional antenna to detect and monitor a business's wireless network from his car. The vehicle is parked on the street about 100 yards from the target building. The attacker is gathering information from the network, such as authentication type, encryption type, and channels in use. At which layer of the Open Systems Interconnection (OSI) Reference Model is he observing?
A. Layer 1 (Physical Layer)
B. Layer 2 (Data Link Layer)
C. Layer 3 (Network Layer)
D. Layer 4 (Transport Layer)