Automated monitoring toolsincrease the likelihood of detecting suspicious activity(Option A) by continuously analyzing security logs for anomalies. ISACA CISA Reference:Security Information and Event Management (SIEM) solutions are recommended for privileged access monitoring.