Watch this video on YouTube
Which one of the following security tools would be in the best position to detect malicious behavior in a device (e.g., your personal computer)?