Final answer:
The best strategy to mitigate risks for IoT devices with vulnerabilities is to use an isolated wireless network with strong encryption and authentication such as WPA2 and EAP-TLS.
Step-by-step explanation:
To mitigate the risk posed by IoT locks, sensors, and cameras with known vulnerabilities, the best strategy would be to both segment the network and ensure strong security protocols are in place. Implementing option C, which suggests associating the devices with an isolated wireless network configured for WPA2 and EAP-TLS, provides this comprehensive approach. This ensures that the communication is encrypted and authenticated, making it significantly more difficult for unauthorized access to occur. While direct wiring (option A) can eliminate some wireless threats and creating exclusive VLANs adds a layer of segmentation, it does not provide strong encryption or authentication for the wireless communication. Option B, requiring sensors to sign all transmitted unlock control messages digitally, adds security to the messages themselves, but does not protect against network-level attacks. Finally, an out-of-band monitoring solution (option D) would be helpful in detecting attacks, but does not prevent them from occurring in the first place.