Westonci.ca connects you with experts who provide insightful answers to your questions. Join us today and start learning! Get immediate and reliable solutions to your questions from a community of experienced experts on our Q&A platform. Get immediate and reliable solutions to your questions from a community of experienced professionals on our platform.

Which of the following types of threat intelligence is collected from proactively established security infrastructure or by employing various threat manipulation techniques to lure and trap threats?
A. Open-source intelligence (OSINT)
B. Cyber counterintelligence (CCI)
C. Indicators of compromise (IoCs)
D. Signals intelligence (SIGINT)