A cybersecurity analyst observes that a server's processor usage has spiked to near 100% unexpectedly. Which of the following actions should they take first to diagnose whether this is related to potentially malicious activity?
Monitor incoming and outgoing network traffic for any suspicious patterns.
Send memory dump files to an automated analysis tool to identify potential threats.
Examine running processes to check for any unusual or unauthorized activities.
Reboot the server to reset processor usage and monitor if the issue reoccurs.