Join the IDNLearn.com community and get your questions answered by knowledgeable individuals. Get step-by-step guidance for all your technical questions from our knowledgeable community members.

Which of the following types of threat intelligence is collected from proactively established security infrastructure or by employing various threat manipulation techniques to lure and trap threats?
A. Open-source intelligence (OSINT)
B. Cyber counterintelligence (CCI)
C. Indicators of compromise (IoCs)
D. Signals intelligence (SIGINT)