Chapter 7 Flashcards

1
Q

Explain key bumping.

A

Key bumping involves using a separate key with even bitting to open a lock by causing pins to jump.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe cylinder pulling technique.

A

Cylinder pulling involves using a hardened screw attached to a handle to rip the cylinder from the lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Boolean Logic used for in electrified locking systems?

A

Boolean Logic in electrified locking systems sets rules for operations like ‘if door A is locked, and door B is locked, then door C can be opened.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the process of jamb peeling.

A

Jamb peeling involves removing portions of the jamb to disengage the bolt from the strike, like using a crowbar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define loiding in the context of physical access control.

A

Loiding is inserting a thin item between the strike and the latch bolt to pry the door open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the technique of drilling in lock opening.

A

Drilling is using a drill to modify the shear line and open the lock, followed by turning the lock plug.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Physical Access Control (PAC) designed to permit?

A

It is designed to permit only authorized users and vehicles to enter and exit a site, area, building, or room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How may an adversary defeat an access control point according to the notes?

A

An adversary may employ deceit, physical attack, or a technical attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the forms of credentials for Electronic Access Control (EAC) systems?

A

Credentials take the form of something you know, something you have, something you do, and something you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should a PIN code not be a number that is meaningful to the individual?

A

To prevent easy guesses or potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is one million combinations possible for according to the notes?

A

A 6-digit PIN code, which has one million combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should be collected prior to employee separations?

A

All access cards and key fobs should be collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the concept of Fail Secure?

A

The lock will remain locked under any failure condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the Fail Soft concept in lock systems.

A

The lock operates briefly after a failure before going into fail secure mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Electromagnetic Locks.

A

They use powerful electromagnets to secure doors or gates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the typical mounting location for Electromagnetic Locks?

A

Typically mounted at the head of a door but can also be on the side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a request to exit button in Electromagnetic Locks?

A

It usually has an automated egress feature or a single-press button for egress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What level of holding force should an Electromagnetic lock have?

A

At least 1,200 pounds (544 kg) of holding force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why are Electromagnetic locks recommended to be fail-safe?

A

To remain unlocked during power failures; higher security may require backup power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are Electromechanical locks?

A

Access control locks that do not use magnets but use breakaway strikes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain Electric Strike.

A

It operates with a standard mechanical lock to hold or open the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an Electric Latch in terms of functionality?

A

A solenoid-activated beveled latch that closes by pushing the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe an Electric Deadbolt.

A

The oldest electrical locking device, not commonly used for automatic door opening during fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an Electric Lockset?

A

A regular mortise lockset that has been electrified to control handle turning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are Electronic Crash/Panic Bars used for?

A

Exit devices on high-occupancy doors with a delayed egress function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How are codes and standards in building construction governed?

A

Governed by the Authority Having Jurisdiction (AHJ) and codes like the International Building Code (IBC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What did the International Building Code (IBC) replace?

A

It replaced the Uniform Building Code for standardization and safety in building construction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Photo Identification Badge?

A

A badge requiring manual check comparing the person to the photo on the badge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What technology makes forgeries difficult for Photo Identification Badges?

A

Overlays, holograms, and dye sublimation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How does an Exchange Badge work for access control?

A

An officer exchanges the badge at the checkpoint, which then opens the portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Stored Image Badge?

A

A credential where a security officer compares the image on the screen to the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What features can be included in Coded Credentials?

A

Time, date, unique user number, anti-pass-back feature, interfaces, and auditing.

33
Q

How do Barcodes work for authentication?

A

They use a series of readable lines but are not suitable for high security applications.

34
Q

What type of data is encoded on Magnetic Stripe credentials?

A

Data is encoded on the magnetic stripe of the card.

35
Q

What distinguishes Low coercivity magnetic cards from High coercivity cards?

A

Low coercivity - 300 oersteds (credit cards), High coercivity - 2500 to 4000 oersteds (security applications).

36
Q

What can alter the contents of the magnetic stripe on cards?

A

Rare earth magnets, but not common household magnets.

37
Q

What is Weigand Wire used for in access control?

A

It stores data and has become an industry standard for data protocol.

38
Q

How do Proximity cards emit frequencies when used for access control?

A

They have embedded microprocessors that emit frequencies when near the reader.

39
Q

What are the different frequencies used by Proximity cards?

A

Low frequency (125 kHz) and high frequency (2.5 MHz to 1 GHz).

40
Q

What distinguishes Active card readers from Passive card readers?

A

Active readers transmit RF signals continuously and have a battery, while passive readers detect and power the card.

41
Q

What are Dual/Triple Technology cards?

A

Cards with multiple technologies like barcodes and magnetic stripes for added security.

42
Q

What are the main features of Smart Cards?

A

Embedded processors, can be contactless/contact, store data, durable, difficult to counterfeit.

43
Q

How does Near Field Communications (NFC) function as a credential?

A

It uses a cellular phone as a credential and is becoming more common.

44
Q

What are the three parts egress can be broken into?

A

Travel to an exit, exit itself, path to a safe area

45
Q

Which organizations were merged to create the International Building Code (IBC)?

A

BOCA, ICBO, SBCCI

46
Q

What was the IBC’s greatest area of concern?

A

The ability to exit a building safely

47
Q

What is the most commonly used locking system for restricting access?

A

Traditional lock and key systems

48
Q

What is the policy driver for the lock program within an organization?

A

Written policy

49
Q

Who developed the pin tumbler lock?

A

Linus Yale developed the pin tumbler lock in the 19th century.

50
Q

How do pin tumbler locks operate?

A

Pin tumbler locks operate using pins and depth settings aligned by a key.

51
Q

What security measures do high-security pin-tumbler locks often deploy?

A

High-security pin-tumbler locks deploy pick resistant, drill resistant, and bump resistant measures.

52
Q

What is the purpose of master keying in locks?

A

Master keying allows one key to open multiple locks, reducing the number of keys needed.

53
Q

What is the advantage of reusable cores in locks?

A

Reusable cores offer a cost-effective solution for key loss or theft.

54
Q

What is a vulnerability of padlocks?

A

Mechanical padlocks are susceptible to loiding, which involves releasing the shackle.

55
Q

How do high-security cylinders enhance security in locks?

A

High-security cylinders interlock pins using wards and may have pick-resistant features.

56
Q

What is the purpose of using facial recognition technology?

A

To verify identity based on facial characteristics.

57
Q

What are the challenges faced by Face Geometry biometrics?

A

Issues include face angle, lighting, glasses, and facial expressions affecting accuracy.

58
Q

How does Keystroke biometrics identify individuals?

A

By analyzing typing patterns for computer logon.

59
Q

What types of biometrics are being tested in addition to facial recognition and keystroke?

A

Gait, fingernail beds, ear shape, and body odor.

60
Q

Why should locks not be used as standalone security measures?

A

They must be used with other physical security measures for effectiveness.

61
Q

What are the two general types of locks discussed?

A

Mechanical locks and electrified locks.

62
Q

What are the functional components of a mechanical lock?

A

Bolt or latch, strike or keeper, tumbler array, key or unlocking device.

63
Q

Why should warded locks not be used in a modern lock program?

A

They have no security benefit and are outdated.

64
Q

How do lever locks operate?

A

Using flat metal levers that interact with a key to withdraw the bolt.

65
Q

Where are wafer (disk) locks typically found?

A

In automobiles, utilizing flat tumblers that can be master keyed.

66
Q

What locks are common on safes and resemble lever locks?

A

Dial combination locks.

67
Q

What security measures do wafer locks offer?

A

They can be designed with double-bitted keys.

68
Q

What is the purpose of Security Presidential Directive 12 (HSPD-12)?

A

To standardize access credential cards for all US government agencies.

69
Q

What standard is the high-security credential card based on?

A

Federal Information Processing Standard 201 (FIPS 201).

70
Q

What is the basis of a Personal Identity Verification (PIV) system?

A

Biometrics.

71
Q

What are Type I and Type II errors in biometric systems?

A

Type I: False rejection of an authorized person. Type II: False acceptance of an unauthorized person.

72
Q

What is the crossover point in a biometric system?

A

Where the number of false rejections equals the number of false accepts.

73
Q

Why might a higher security area choose to have higher Type I errors?

A

To prioritize rejecting unauthorized persons over falsely accepting authorized persons.

74
Q

What biometric technology measures hand and finger dimensions?

A

Hand or Finger Geometry.

75
Q

What is the method fingerprint readers predominantly use to validate identity?

A

Minutia points, ridge endings, and bifurcations on the fingers.

76
Q

How does the eye pattern biometric technology work?

A

It scans patterns in the eye, like Retina scans using LED light.

77
Q

What is unique about iris scans compared to other biometric methods?

A

No physical contact required, making it less likely to transmit illness.

78
Q

What are some reasons for individuals not being able to use an Iris scanner?

A

Blindness, dark irises, or dilated pupils in approximately 2 percent of the population.

79
Q

What does the Voice Pattern biometric technology use to verify access?

A

It uses voice characteristics like pitch, waveform, and resonant frequencies.