I think the first step would be to understand how most ransomware infects a system.
I'm not sure I've seen a documented case where the entry point for ransomware was a database server. They are typically introduced into a system through a web site or malicious email, although the bad guys come up with something different my the minute.
Looking at all of the various things the vulnerability scan looks at, there are few, if any, things that would specifically prevent a ransomware attack.
In other words, preventing an attack is far more complex than anything this tool can do.
There are a number of "ransomware simulators" that you can leverage.