B. Network-based scanner.
A network-based scanner is a tool that scans multiple machines within a network to identify vulnerabilities. It operates by probing network devices, servers, and workstations to detect weaknesses such as open ports, misconfigurations, and outdated software that can be exploited.
In this scenario:
1. A scanner is installed on a machine within the organization’s network.
2. It scans several machines on the same network to find vulnerabilities.
3. The attacker uses this information for further exploitation.
Why not the others:
A. Agent-based scanner – Requires agents installed on each device for vulnerability scanning. The scenario does not mention this.
C. Cluster scanner – Typically used for scanning clusters of servers or cloud environments, which is not specified here.
D. Proxy scanner – Used for anonymizing scans and routing traffic through proxies, not for internal network scanning.