You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?
A.
The extra hard disk space required to store the database of checksums
B.
The amount of memory remaining now that the checksum-based application is running
C.
The possibility of a buffer overflow attack leading to a security breach
D.
The security of the checksum database on a read-only media format