A security analyst needs to be proactive in understanding the types of attacks that could potentially target the company’s executives.
Which of the following intelligence sources should the security analyst review?
A . Vulnerability feeds
B . Trusted automated exchange of indicator information
C . Structured threat information expression
D . Industry information-sharing and collaboration groups
Answer: D