1.1 Explain the importance of system and network architecture concepts in security operations, 1.2 Given a scenario, analyze indicators of potentially malicious activity, 1.3 Given a scenario, use appropriate tools or techniques to determine malicious activity...