I did some custom file 'fingerprinting' work some time ago when management didn't want to spring for Tripwire. For each file, the system stored both the md5sum and an shasum in addition to the file size. Figured that it was sufficiently improbable that a single altered file could collide in both hashing functions, particularly without changing in file size.
Granted, a rootkit could probably mess with return values to make it look as though the file hadn't changed at all, but at that point monitoring binaries and config files for changes isn't going to help.
How are we supposed to have a conversation about this if you're going to go and cloud the discussion with actual facts?
Oh, so they'll be teaching them how to manage systems running real operating systems like AIX, Solaris, *BSD, and various flavors of Linux. Neat.
Subject says it all.
This is... ridiculous.
You will have many recoverable tape errors.