Chapter 7 Flashcards

1
Q

An adversary may employ these three things.

A
  1. deceit, 2. physical attack, 3. a technical attack to defeat an access control point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The use of ___ such as a turn-style or revolving door should be used to eliminate tailgating

A

Singe sentry devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All levels of access should be ___ and entry should be provided on a need-to-access basis.

A

Periodically reassessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System design is based on these five things.

A
  1. throughput requirements, 2. building and fore codes, 3. integration with other systems, 4. procedural requirements, 5. database management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ should automatically guarantee admission to secured area.

A

possession of a credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ___ and ___ has become the de facto industry standard.

A

Weigand signal and Data protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does PIV stand for.

A

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ___ system is based on biometrics. Biometrics verify a person’s specific characteristics. In verification mode, a persons initiates the claim of identity. In recognition mode, the equipment attempts to identify the person.

A

Personal identity Verification (PIV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ are a performance indicator of the system. Type 1 error is a false rejection. Type 2 error is a false acceptance. The point where the number of false rejections equals the number a false accepts is called the crossover point.

A

Error rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ check the iris structure of the eye— the colored part of the eye. The scan can be done for 10 to 12 inches away from the scanner’s video camera, so no physical contact is required.

A

Iris scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ have been used for more than 100 years and are still considered to be one of the most reliable means of distinguishing one person from another.

A

Fingerprint biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ should not be used as a standalone measure and must be used with other physical security measures to be effective.

A

Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are two types of locks in general.

A
  1. Mechanical locks, 2. Electrified locks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___ was used in the WWII era and has no security benefit. It is the oldest type of mechanical lock in use today.

A

Warded lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ___ is based on the number of tumblers (typically 4). Theoretically, 100 dial positions with four tumblers could equal 1,000,000 combinations.

A

Dial combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ were developed in the 19th century by Linus Yale (who also developed the combination lock) and are used in many residential homes and businesses. The are the most commonly used locks.

A

Pin tumbler locks

17
Q

Tight tolerances and increasing number of pins, wheels, disks, or levers is the best defense against all forms of ___

A

Lock manipulation

18
Q

___ is where the adversary inserts a thin item between the strike and the latch bolt to pry the door open

A

Loiding

19
Q

___ is where the locking devices are arranged in sets with defined rules such as; “if door A is locked, and door B is locked, then door C can be opened.” This is a useful design for vehicle portals, mantraps, and other high-security applications.

A

Boolean Logic

20
Q

An ___ should have at least 1,200 pounds of holding force, contain no moving parts, and tamper resistant

A

Electromagnetic lock

21
Q

The ___ greatest area of concern was the ability to exit a building safely. Egress can be broken into three parts. What are they?

A
  1. travel to an exit, 2. the exit itself and, 3. path to a safe area.
22
Q

___ are still the most commonly used locking systems for restricting access.

A

Traditional lock and key systems.