A cybersecurity responder monitors a hacker's activities covertly to prepare a containment and eradication plan. This technique involves gaining an informational advantage over an adversary by observing them without their knowledge, allowing for strategic planning and response. What threat-hunting technique is being employed? a) Data Encryption b) Intrusion Detection c) Passive Reconnaissance d) Firewall Configuration