Blue Book Chapter 8 Questions Flashcards

1
Q

Why is mechanical access control considered the least secure form of access control?

A

Loss or legitimate use of a key or combination compromises the entire security of the whole locking scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can something as simple as a lost key cost a company a lot of money?

A

It depends on how sophisticated the system is, but it may be necessary to re-install new locks on every door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is Electronic access control different from mechanical access control?

A

Mechanical is an actual key

Electronic is a code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main difference between the two control panel types?

A

Stand-alone - processes info locally and does not communicate.
Network - can share data with other control units/sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two most common communication methods for networked control panels?

A

RS485 and ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the operation on a distributed intelligence system.

A

Characterized by multiple local control units connected to a central control unit. Local units store at least some user and transaction data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most card readers communicate with the control panel over what type cable?

A

5-8 conductor shielded cable

6 conductor most times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typically, what is the maximum length for a reader cable?

A

500 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Mag Stripe for a reader:

A

Like credit card - encoding is read when the card passes in front of the read head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Proximity for a reader:

A

Card is placed in proximity of the reader so the head can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What card format is considered to be the industry standard?

A

26 bit Weigand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are site codes?

A

A set of prefixed numbers to a card’s data information. A unique number common to all the cards in a particular set. The idea is that an organization will have their own site code and a set of numbered cards incrementing from 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four methods for reading access control cards?

A

swipe, insert, touch, proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do the following reader types work?
Bar Code
Mag Stripe
Proximity

A

Bar Code - light source shines card and reflects back at light sensor
Mag Stripe - just like a credit card; magnetic material is encoded
Proximity - circuit embedded in card. Low power, short range frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five base forms for proximity media?

A

clamshell, keyfob, ISO, stick on, powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the normal read range for a proximity reader?

A

1-8”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What card can be used to increase the range of a reader?

A

Powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are proximity readers ideal for high traffic doors?

A

Process more users quickly; card doesn’t touch door; people use door faster

19
Q

What makes a smart card different from other card types?

A

has an electronic memory

20
Q

Where are contact type smart cards mainly used?

A

smart credit and debit card; user card of satellite receiver

21
Q

What information can be stored on smart cards?

A

access related information, fingerprints, log information, user information

22
Q

What are hybrid/mixed cards?

A

cards with multiple uses - can be used with old and new technology

23
Q

How can you increase the security of a keyboard?

A

keyguard or position keypad

24
Q

What are the most common physical attributes used for biometric readers?

A

fingers, hand geometry, retinal or iris, voice

25
How is a biometric reader made more secure?
use more credentials - personal attributes are virtually impossible to duplicate.
26
What locksets are typically used for emergency exit doors?
Rim locksets
27
What are the typical operating voltages for electric locksets?
12 or 24v
28
How do AC-powered door strikes differ from DC powered door strikes?
DC can be backed up with batteries; | DC are silent while AC's buzz
29
Describe the difference between fail safe an fail secure locksets.
fail safe - strike is open | fail secure - strike is closed
30
What lock designation is necessary for an emergency exit?
fail safe
31
Why does a fail safe door strike need to be powered from a DC source?
It would buzz constantly as an AC door - (plus has added backup by battery?)
32
Why is it important for the magnetic lock strike plate to "float"?
Makes the best contact with magnet when door closes.
33
What are the three holding force ratings for magnetic locks?
1500-1200lb 750-600lb 300-250lb
34
Is a magnetic lock or an electric strike preferred for a high traffic door? Why?
Magnetic lock, because it puts more stress on an electric strike
35
What does the term "forced open" refer to?
When a door is help open longer than the preset time period.
36
What device is used with maglocks when tampering is a concern?
Bond sensor
37
The two main requests to exit devices are:
exit push button and REX motion
38
What is the purpose of delayed egress?
To help thwart or discourage unauthorized use during non-emergency situations.
39
How does a delayed egress door work?
Delays unlock of door for 15 seconds after egress request has been made. An alarm also goes off.
40
Turnstiles are broken down into what two categories?
physical and optical
41
What type of connection is needed when interfacing with the fire alarm panel?
fail safe relay connection
42
What is the purpose of an audit trail?
It's a detailed list of all transactions occurring on the system.
43
What type of lock is always fail safe?
mag lock
44
``` Define the following programming features: Access Group Anti-Passback First Person In Holiday Input Output ```
Access Group - set of time zones and doors applied to a group of users. Anti-Passback - prevents a card or code from being used at the same reader more than once until the anti-passback has been reset First Person In - performs a function when the first valid user within a specific time window uses an access reader Holiday - system overrides time zone and door permissions to restrict access during holiday hours. Input - access control panels ability to monitor external devices through input's "readers" Output - outputs control external devices "locks and alarms"