Access Control Flashcards

1
Q

What is a technical attack on an ACS?

A

The forging of a credential, personal identification number, or obtains another persons credential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three methods can be deployed to defeat an access point?

A

1) Deceit
2) Physical Attack
3) Technical Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What five things is an ACS design based off of?

A

1) Throughput requirements
2) Building and fire codes
3) Integration with other systems
4) Procedural requirements
5) Database management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly