Transcript text: A security team is working to maintain operational visibility during a security incident involving potential indicators of compromise on a critical system. To effectively respond to the situation, what should be the primary focus of the team's investigation?
System log inconsistencies Unauthorized scheduled tasks Reviewing suspicious email attachments Monitoring and analyzing anomalous activity