A new cluster of virtual servers has been set up in a lab environment and must be audited before being allowed on the production network.
The security manager needs to ensure unnecessary services are disabled and all system accounts are using strong credentials.
Which of the following tools should be used? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.BF.
The two tools that should be used to audit the cluster of virtual servers for disabling unnecessary services and ensuring strong credentials are:
B. SCAP scanner: SCAP (Security Content Automation Protocol) is a NIST (National Institute of Standards and Technology) standard for automating the process of vulnerability management, security measurement, and compliance evaluation of computer systems. SCAP scanners can be used to scan the virtual servers and identify any security vulnerabilities, misconfigurations, or non-compliance with security policies. SCAP scans can help to identify which unnecessary services are enabled, and they can also help to ensure that system accounts are using strong credentials.
D. Password cracker: A password cracker is a tool that can be used to test the strength of passwords used by system accounts on the virtual servers. Password crackers can be used to test the strength of passwords by attempting to guess passwords using various techniques such as dictionary attacks, brute force attacks, or hybrid attacks. Password crackers can help to identify weak passwords and ensure that system accounts are using strong credentials.
A. Fuzzer: A fuzzer is a tool that can be used to test the robustness of software applications by sending random or malformed input data to the application. Fuzzers are generally used for testing the security and stability of software applications and are not typically used for auditing virtual servers.
C. Packet analyzer: A packet analyzer is a tool that can be used to capture and analyze network traffic. Packet analyzers are typically used for troubleshooting network issues or for analyzing network traffic for security incidents. Packet analyzers are not typically used for auditing virtual servers.
E. Network enumerator: A network enumerator is a tool that can be used to gather information about a network and its resources. Network enumerators are typically used for mapping a network and identifying resources, such as hosts and services, that are available on the network. Network enumerators are not typically used for auditing virtual servers.
F. SIEM: A Security Information and Event Management (SIEM) system is a tool that can be used to monitor, collect, and analyze security events from across a network. SIEM systems are typically used for detecting and responding to security incidents. SIEM systems are not typically used for auditing virtual servers, although they can be used to monitor security events on the virtual servers once they are deployed on the production network.