An analyst is reviewing a system's task scheduler and notices a newly added task that launches a script at midnight daily. Upon further investigation, it is found that the script is obfuscated and has no documentation regarding its purpose. To determine if this task is benign or should be elevated as a security incident, which of the following actions would BEST establish the legitimacy of the scheduled task?
Analyze the script's code and behavior in a sandbox environment.
Review the account that created the scheduled task for any correlations with other known user activities.
Inspect the scheduling pattern to check for consistency with other administrative tasks.
Monitor resource utilization during the task's operation to identify any abnormal consumption patterns.