Automated monitoring tools increase the likelihood of detecting suspicious activity (Option A) by continuously analyzing security logs for anomalies. ISACA CISA Reference: Security Information and Event Management (SIEM) solutions are recommended for privileged access monitoring.