A technician suspects that a piece of malware is consuming too many CPU cycles and slowing down a system. Which of the following will help determine the amount of CPU cycles that are being consumed?
A.
Install HIDS to determine the CPU usage.
B.
Run performance monitor to evaluate the CPU usage.
C.
Install malware scanning software.
D.
Use a protocol analyzer to find the cause of the traffic.