(Source: IT Jungle) It checks for user profiles with default passwords, the security level used, whether the audit journal it turned on, and whether ROOT access to the IFS is…