ECCouncil 312-39 Question Answer
A SOC team is implementing a threat intelligence strategy to proactively defend against threats. The CISO emphasizes that collecting data is not enough; the team must allocate personnel, tools, and time to gather intelligence aligned with key concerns (fraud, phishing, nation-state threats). They must determine who will collect intelligence, which sources will be monitored, and how frequently collection occurs. What is this process called?

