Let’s say your ideal scenario involves testing the overall security level of corporate networks, perform audits against web applications and do something with “mobile devices” because that’s what people told you. Perhaps it’s social engineering. It doesn’t matter what you select, those are your goals.