You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?
A.
The extra hard disk space required to store the database of checksums
B.
The amount of memory remaining now that the checksum-based application is running
C.
The possibility of a buffer overflow attack leading to a security breach
D.
The security of the checksum database on a read-only media format
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit