ethical-hacker video for during a cybersecurity incident, an ethical hacker uses an AI-driven system to detect and isolate abnormal user activities across
During a cybersecurity incident, an ethical hacker uses an AI-driven system to detect and isolate abnormal user activities across multiple devices. What tool could they have used?