A cybersecurity responder monitors a hacker's activities covertly to prepare a containment and eradication plan. this technique involves gaining an informational advantage over an adversary by observing them without their knowledge, allowing for strategic planning and response. what threat-hunting technique is being employed?