Which of the following best describes the practice of information sharing within cyber security operations?
The exchange of intelligence regarding threats, vulnerabilities, and incidents among organizations.
The protection of sensitive information by using encryption and access controls.
The routine task of monitoring and managing software updates and patches.
The process of identifying potential cybersecurity threats by analyzing network traffic.