Which of the following best describes threat hunting?
Waiting for automated alerts to trigger and then responding to them
A proactive search for signs of malicious activities within an organization's systems
The automated collection and analysis of data to identify potential security threats
Receiving threat intelligence feeds from external sources to understand threat actor behavior