Access Control Flashcards
1
Q
What is a technical attack on an ACS?
A
The forging of a credential, personal identification number, or obtains another persons credential.
2
Q
What three methods can be deployed to defeat an access point?
A
1) Deceit
2) Physical Attack
3) Technical Attack
3
Q
What five things is an ACS design based off of?
A
1) Throughput requirements
2) Building and fire codes
3) Integration with other systems
4) Procedural requirements
5) Database management