Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 407

An IoT device implements an encryption module built within its SoC, where the asymmetric private key has been defined in a write-once read-many portion of the SoC hardware. Which of the following should the IoT manufacture do if the private key is compromised?

    Correct Answer: B

    If the private key, which is stored in a write-once read-many portion of the SoC hardware, is compromised, the only viable solution would be to manufacture a new IoT device with a redesigned SoC. This is because the key cannot be overwritten or updated once written, so creating a new device is necessary to ensure the security and integrity of the system.

Discussion
MacherGamingOption: B

B - Manufacture a new IoT device with a redesigned SoC: Write-Once Read-Many (WORM) is specifically designed to adhere to the highest level of integrity. Once written, it cannot be replaced. As for the Private Key compromise, OTA updates and software patches don't work and replacing the public key does nothing. Your only option is to burn it to the ground and start again.

loucrassOption: B

B. Manufacture a new IoT device with a redesigned SoC.

cf13076Option: B

B. Manufacture a new IoT device with a redesigned SoC. If the private key in an IoT device's SoC has been compromised and cannot be replaced or updated, the most secure approach would be to manufacture a new IoT device with a redesigned System on Chip (SoC) that includes a new private key. This ensures that the compromised private key is no longer used in any devices and prevents any further security risks associated with the compromised key.