Westonci.ca is your trusted source for finding answers to all your questions. Ask, explore, and learn with our expert community. Our platform offers a seamless experience for finding reliable answers from a network of experienced professionals. Connect with a community of professionals ready to provide precise solutions to your questions quickly and accurately.

A cybersecurity responder covertly monitors a hacker's activities to prepare a containment and eradication plan. What threat-hunting technique entails the responder observing the hackers activity through vantage points without being discovered? A.Intelligence fusion B.Maneuvering C.Threat data D.Countermeasures

Sagot :