A cybersecurity team wants to detect unusual traffic patterns that may indicate a network attack, but they don't have predefined attack labels. Which approach is suitable? | AWS Certified Cloud Practitioner Quiz - LeetQuiz