Get reliable answers to your questions at Westonci.ca, where our knowledgeable community is always ready to help. Discover detailed solutions to your questions from a wide network of experts on our comprehensive Q&A platform. Connect with a community of professionals ready to help you find accurate solutions to your questions quickly and efficiently.

Which of the following types of threat intelligence is collected from proactively established security infrastructure or by employing various threat manipulation techniques to lure and trap threats?
A. Open-source intelligence (OSINT)
B. Cyber counterintelligence (CCI)
C. Indicators of compromise (IoCs)
D. Signals intelligence (SIGINT)