A security analyst needs to be proactive in understanding the types of attacks that could potentially target the company’s executives.
Which of the following intelligence sources should the security analyst review?
A . Vulnerability feeds
B . Trusted automated exchange of indicator Information
C . Structured threat information expression
D . Industry Information-sharing and collaboration groups
Answer: A