Welcome to Westonci.ca, the Q&A platform where your questions are met with detailed answers from experienced experts. Join our Q&A platform to get precise answers from experts in diverse fields and enhance your understanding. Join our platform to connect with experts ready to provide precise answers to your questions in different areas.

Which of the following types of threat intelligence is collected from proactively established security infrastructure or by employing various threat manipulation techniques to lure and trap threats?
A. Open-source intelligence (OSINT)
B. Cyber counterintelligence (CCI)
C. Indicators of compromise (IoCs)
D. Signals intelligence (SIGINT)