asked 68.3k views
3 votes
A security engineer is performing an assessment again for a company. The security engineer examines the following output from the review:

Password Complexity Disabled
Require authentication from a DC before sign-in Enabled
Allow guest user access Enabled
Allow anonymous enumeration of groups Disabled

Which of the following tools is the engineer utilizing to perform this assessment?

A. Vulnerability scanner
B. SCAP scanner
C. Port scanner
D. Interception proxy

1 Answer

1 vote

Final answer:

The security engineer is using a vulnerability scanner to assess the company's security settings concerning password complexity, authentication requirements, and user access policies.

Step-by-step explanation:

A security engineer is performing an assessment for a company and examines the output indicating password and access settings. The output refers to the configuration settings related to password complexity, authentication requirements, guest user access, and anonymous enumeration of groups. Given these specific details, the engineer is most likely utilizing a vulnerability scanner. A vulnerability scanner is designed to assess the state of a company's security posture, checking for weaknesses such as poorly configured systems, outdated software, and insufficient security policies. This assessment tool contrasts with other options such as an SCAP scanner, which focuses more on compliance with specific security configurations; a port scanner, which is used to discover open ports and services; and an interception proxy, which is used to monitor and analyze network traffic.

answered
User Igor Alemasow
by
8.0k points
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.