You have a raspberry pi connected to all the sensors and a code running to trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
It is 20 to 25 days so c is correct
The statement "By default, the pfSense firewall allows unrestricted outbound access from the lan interface" is true.
pfSense is free and open source firewall and router that can be installed on a physical computer or a virtual machine. Teh goal is to make the machine a dedicated firewall/router for a network.
It features unified threat management, load balancing, multi WAN etc.