1.1 Compare and contrast different types of social engineering techniques.,
1.2 Given a scenario, analyze potential indicators to determine the type of attack.,
1.3 Given a scenario, analyze potential indicators associated with application attacks.
...