Blue Book Chapter 8 Flashcards
how can something as simple as a lost key cost a company a lot of money
Replacing keys, lock-sets and codes is very expensive. may also have to hire a gaurd
what information can be stored on smart cards
- photos
- ID
- personal info
- financial information
- medical information
- fingerprints…
what are the two most common communication methods for network control panels.
Ethernet -
RS485 4,000 feet
What is the least secure form of access control?
Mechanical
what are the three holding force ratings for magnetic locks?
250-500 lbs
600-750 lbs
1,200-1,500 Lbs
How do AC powered door strikes differ from DC powered door strikes
AC has a constant buzz when powered off a transformer while DC is silent and can use a battery powered back up.
is a mag lock or electric strike preferred for a high traffic door?
mag locks because they have less moving parts. strikes wear out.
What is the difference between fail safe and fail secure lock-sets?
fail safe doors unlock when power is lost and must be DC voltage only
Fail secure doors stay lock during power loss and can use AC or DC power
what type of connection is needed when interfacing with the fire alarm panel
fail safe
what is the normal read range for a proximity reader?
1-8 inches
what lock-sets are typically used for emergency exit doors
rim locksets
how does a delayed egress door work?
delay unlocking for 15-30 seconds upon egress request. sounds alert or alarm
what can be used to increase the range of a reader?
- use a powered reader
- use active card (not passive)
Why is it important for the magnetic lock strike plate to float?
so the strike plate has the best possible contact to the magnet when door closes.
how do bar code readers work?
- insert card, light reflects off bar, number is scanned.
- like a UPC scanner
- Easily copied lite security
what is the purpose of an audit trail
provides a detailed list of all transactions occurring.
What are site codes
sets of pre-fixed numbers to a cards data information
what makes a smart card different from other card types
-stores information
How does a mag stripe reader work?
swipe card - like credit or debit card.
describe the operation on a distributed intelligence system.
multiple local control units connected to a central control point
what is the purpose of delayed egress?
discourage unauthorized use during non emergency situation
What lock designation is necessary for emergency exit?
fail safe
What card format is considered to be the industry standard?
Wiegand - 26 bit
what type of lock is always fail safe
magnetic.
a normally closed input device continually keeps a circuit ___________.
a normally closed input device continually leaves a circuit active or complete
Most card readers communicate with the control panel over what type of cable?
5-8 conductor shielded.
why does a fail safe door strike need to be powered from a DC source?
so it can does not buzz and can use battery backup
what are the two main request to exit devices
- motion detector
- push button
what are the five basic forms for proximity media
- standard (clam-shell)
- Key Fob
- ISO
- Stick on
- Powered
what device is used with mag locks when tampering is a concern?
bond sensor
how is a bio-metric reader made more secure?
two step bio-metric reader
What are 4 methods of reading access control cards
swipe
insertion
touch
proximity
turnstiles are broken down into what two categories
physical and optical
what is the maximum length for a reader cable?
rs485 - 500ft or 4000ft?
a normally open input device continually keeps a circuit _________
a normally open input device continually keeps a circuit open or incomplete
What is the main difference between the two control panel types.
stand alone grants access locally where as network grants access locally and communicates with other control units.
Why are proximity readers ideal for high traffic doors
higher portal throughput - faster
what ate the most common physical attributes used for bio-metric readers
- facial recognition
- fingerprints
- hand geometry
- retinal
- iris pattern
- vascular pattern scan
Why is mechanical access control considered the least secure form of access control?
Keys can be lost of duplicated and combinations can be transferred or written down.
How does a proximity reader work?
- bring card near reader embedded circuit is read
- RF signal (radio frequency)
What are the typical operating voltages for electric lock-sets?
- 12v
- 24v (requite less current but double the batteries)
what does the term force open refer to?
kicked or keyed open without valid credential presented.
where are contact type cards mainly used
credit/debit cards