A security analyst needs to be proactive in understand the types of attacks that could potentially target the company’s execute.
Which of the following intelligence sources should to security analyst review?
A . Vulnerability feeds
B . Trusted automated exchange of indicator information
C . Structured threat information expression
D . Industry information-sharing and collaboration groups
Answer: D