Question 52:
After the acquisition of an environment monitoring infrastructure from a local operator, you need to integrate hundreds of their field devices into your company’s IoT infrastructure. Most of the devices use X.509 authentication but there are some device types that are secured with TPM modules. After all the devices have been transferred to your ownership, you need to ensure that the previous owner won’t have any access to the devices. You decide to re-generate the TPM endorsement keys of the devices. Is that the action you should take?
Answer options:
A.Yes B.No