Blue Book Chapter 8 Questions Flashcards Preview

2nd year > Blue Book Chapter 8 Questions > Flashcards

Flashcards in Blue Book Chapter 8 Questions Deck (44)
Loading flashcards...
1

Why is mechanical access control considered the least secure form of access control?

Loss or legitimate use of a key or combination compromises the entire security of the whole locking scheme.

2

How can something as simple as a lost key cost a company a lot of money?

It depends on how sophisticated the system is, but it may be necessary to re-install new locks on every door.

3

How is Electronic access control different from mechanical access control?

Mechanical is an actual key
Electronic is a code

4

What is the main difference between the two control panel types?

Stand-alone - processes info locally and does not communicate.
Network - can share data with other control units/sites

5

What are the two most common communication methods for networked control panels?

RS485 and ethernet

6

Describe the operation on a distributed intelligence system.

Characterized by multiple local control units connected to a central control unit. Local units store at least some user and transaction data.

7

Most card readers communicate with the control panel over what type cable?

5-8 conductor shielded cable
6 conductor most times

8

Typically, what is the maximum length for a reader cable?

500 ft.

9

Define Mag Stripe for a reader:

Like credit card - encoding is read when the card passes in front of the read head.

10

Define Proximity for a reader:

Card is placed in proximity of the reader so the head can read it.

11

What card format is considered to be the industry standard?

26 bit Weigand

12

What are site codes?

A set of prefixed numbers to a card's data information. A unique number common to all the cards in a particular set. The idea is that an organization will have their own site code and a set of numbered cards incrementing from 1

13

What are the four methods for reading access control cards?

swipe, insert, touch, proximity

14

How do the following reader types work?
Bar Code
Mag Stripe
Proximity

Bar Code - light source shines card and reflects back at light sensor
Mag Stripe - just like a credit card; magnetic material is encoded
Proximity - circuit embedded in card. Low power, short range frequency

15

What are the five base forms for proximity media?

clamshell, keyfob, ISO, stick on, powered

16

What is the normal read range for a proximity reader?

1-8"

17

What card can be used to increase the range of a reader?

Powered

18

Why are proximity readers ideal for high traffic doors?

Process more users quickly; card doesn't touch door; people use door faster

19

What makes a smart card different from other card types?

has an electronic memory

20

Where are contact type smart cards mainly used?

smart credit and debit card; user card of satellite receiver

21

What information can be stored on smart cards?

access related information, fingerprints, log information, user information

22

What are hybrid/mixed cards?

cards with multiple uses - can be used with old and new technology

23

How can you increase the security of a keyboard?

keyguard or position keypad

24

What are the most common physical attributes used for biometric readers?

fingers, hand geometry, retinal or iris, voice

25

How is a biometric reader made more secure?

use more credentials - personal attributes are virtually impossible to duplicate.

26

What locksets are typically used for emergency exit doors?

Rim locksets

27

What are the typical operating voltages for electric locksets?

12 or 24v

28

How do AC-powered door strikes differ from DC powered door strikes?

DC can be backed up with batteries;
DC are silent while AC's buzz

29

Describe the difference between fail safe an fail secure locksets.

fail safe - strike is open
fail secure - strike is closed

30

What lock designation is necessary for an emergency exit?

fail safe