Select the following activities that are specific to Threat Hunting. Monitoring \& analyzing security detections Searching device logs, IDS alerts and other data Gathering data on the threat through threat intelligence Writing detections for IDS/IPS Select all that fall under Vulnerability Scanning Actively exploiting security controls Non-credentialed Scan Configuration compliance scans Credentialed Scan Passively testing security controls.