1.1 Compare and contrast different types of social engineering techniques, 1.2 Given a scenario, analyze potential indicators to determine the type of attack
1.3 Cables and connectors, 2.2 Compare and contrast routing technologies and bandwidth management concepts., 3.3 Explain high availability and disaster recovery concepts and summarize best solution....