During a threat hunting operation, which of the following would be the BEST focus area to ensure the protection of sensitive information while simultaneously detecting potential unauthorized access?
Business-critical assets and processes
Deployment of honeypots within the network
Monitoring of isolated networks disconnected from the internet
Misconfigurations of software and hardware components