CompTIA Security+ SY0-601 – Question097

Which of the following should be monitored by threat intelligence researchers who search for leaked
credentials?


A.
Common Weakness Enumeration
B. OSINT
C. Dark web
D. Vulnerability databases

Correct Answer: C