A Chief Information Security Officer (CISO) needs to ensure that a laptop image remains unchanged and can be verified before authorizing the deployment of the image to 4000 laptops.
Which of the following tools would be appropriate to use in this case?
A . MSBA
B . SHA1sum
C . FIM
D . DLP
Answer: B