A company notices suspicious activity on one of its computers. Upon investigation, you discover an unknown process consuming a large amount of CPU and memory resources. What should you use to perform a detailed analysis of the cause?
EDR
Antivirus scan
Internet Protocol (IP) reputation service
Basic task manager