Question 1: What is a common difficulty in identifying social engineering attacks?