At Westonci.ca, we connect you with the answers you need, thanks to our active and informed community. Get detailed answers to your questions from a community of experts dedicated to providing accurate information. Experience the convenience of finding accurate answers to your questions from knowledgeable experts on our platform.

Which of the following types of threat intelligence is collected from proactively established security infrastructure or by employing various threat manipulation techniques to lure and trap threats?
A. Open-source intelligence (OSINT)
B. Cyber counterintelligence (CCI)
C. Indicators of compromise (IoCs)
D. Signals intelligence (SIGINT)