A cybersecurity responder covertly monitors a hacker's activities to prepare a containment and eradication plan. What threat-hunting technique entails the responder observing the hackers activity through vantage points without being discovered? A.Intelligence fusion B.Maneuvering C.Threat data D.Countermeasures