Blue Book Chapter 8 Questions Flashcards

1
Q

Why is mechanical access control considered the least secure form of access control?

A

Loss or legitimate use of a key or combination compromises the entire security of the whole locking scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can something as simple as a lost key cost a company a lot of money?

A

It depends on how sophisticated the system is, but it may be necessary to re-install new locks on every door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is Electronic access control different from mechanical access control?

A

Mechanical is an actual key

Electronic is a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main difference between the two control panel types?

A

Stand-alone - processes info locally and does not communicate.
Network - can share data with other control units/sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two most common communication methods for networked control panels?

A

RS485 and ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the operation on a distributed intelligence system.

A

Characterized by multiple local control units connected to a central control unit. Local units store at least some user and transaction data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most card readers communicate with the control panel over what type cable?

A

5-8 conductor shielded cable

6 conductor most times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typically, what is the maximum length for a reader cable?

A

500 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Mag Stripe for a reader:

A

Like credit card - encoding is read when the card passes in front of the read head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Proximity for a reader:

A

Card is placed in proximity of the reader so the head can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What card format is considered to be the industry standard?

A

26 bit Weigand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are site codes?

A

A set of prefixed numbers to a card’s data information. A unique number common to all the cards in a particular set. The idea is that an organization will have their own site code and a set of numbered cards incrementing from 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four methods for reading access control cards?

A

swipe, insert, touch, proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do the following reader types work?
Bar Code
Mag Stripe
Proximity

A

Bar Code - light source shines card and reflects back at light sensor
Mag Stripe - just like a credit card; magnetic material is encoded
Proximity - circuit embedded in card. Low power, short range frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five base forms for proximity media?

A

clamshell, keyfob, ISO, stick on, powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the normal read range for a proximity reader?

A

1-8”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What card can be used to increase the range of a reader?

A

Powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are proximity readers ideal for high traffic doors?

A

Process more users quickly; card doesn’t touch door; people use door faster

19
Q

What makes a smart card different from other card types?

A

has an electronic memory

20
Q

Where are contact type smart cards mainly used?

A

smart credit and debit card; user card of satellite receiver

21
Q

What information can be stored on smart cards?

A

access related information, fingerprints, log information, user information

22
Q

What are hybrid/mixed cards?

A

cards with multiple uses - can be used with old and new technology

23
Q

How can you increase the security of a keyboard?

A

keyguard or position keypad

24
Q

What are the most common physical attributes used for biometric readers?

A

fingers, hand geometry, retinal or iris, voice

25
Q

How is a biometric reader made more secure?

A

use more credentials - personal attributes are virtually impossible to duplicate.

26
Q

What locksets are typically used for emergency exit doors?

A

Rim locksets

27
Q

What are the typical operating voltages for electric locksets?

A

12 or 24v

28
Q

How do AC-powered door strikes differ from DC powered door strikes?

A

DC can be backed up with batteries;

DC are silent while AC’s buzz

29
Q

Describe the difference between fail safe an fail secure locksets.

A

fail safe - strike is open

fail secure - strike is closed

30
Q

What lock designation is necessary for an emergency exit?

A

fail safe

31
Q

Why does a fail safe door strike need to be powered from a DC source?

A

It would buzz constantly as an AC door - (plus has added backup by battery?)

32
Q

Why is it important for the magnetic lock strike plate to “float”?

A

Makes the best contact with magnet when door closes.

33
Q

What are the three holding force ratings for magnetic locks?

A

1500-1200lb 750-600lb 300-250lb

34
Q

Is a magnetic lock or an electric strike preferred for a high traffic door? Why?

A

Magnetic lock, because it puts more stress on an electric strike

35
Q

What does the term “forced open” refer to?

A

When a door is help open longer than the preset time period.

36
Q

What device is used with maglocks when tampering is a concern?

A

Bond sensor

37
Q

The two main requests to exit devices are:

A

exit push button and REX motion

38
Q

What is the purpose of delayed egress?

A

To help thwart or discourage unauthorized use during non-emergency situations.

39
Q

How does a delayed egress door work?

A

Delays unlock of door for 15 seconds after egress request has been made. An alarm also goes off.

40
Q

Turnstiles are broken down into what two categories?

A

physical and optical

41
Q

What type of connection is needed when interfacing with the fire alarm panel?

A

fail safe relay connection

42
Q

What is the purpose of an audit trail?

A

It’s a detailed list of all transactions occurring on the system.

43
Q

What type of lock is always fail safe?

A

mag lock

44
Q
Define the following programming features:
Access Group
Anti-Passback
First Person In
Holiday
Input
Output
A

Access Group - set of time zones and doors applied to a group of users.
Anti-Passback - prevents a card or code from being used at the same reader more than once until the anti-passback has been reset
First Person In - performs a function when the first valid user within a specific time window uses an access reader
Holiday - system overrides time zone and door permissions to restrict access during holiday hours.
Input - access control panels ability to monitor external devices through input’s “readers”
Output - outputs control external devices “locks and alarms”