Chapter 7 : Access Control Flashcards

(39 cards)

1
Q

An electromagnetic lock should have at least _____ of holding force, contain no moving parts, and be tamper resistant.

A

1200lbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adversary may employ these type of attacks against access control:

A

1) deceit
2) physical attack
3)technical attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be installed to eliminate tailgating?

A

single entry devices (turnstile or revolving door)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ of access should be periodically reassessed and entry should be provided on a ______ basis.

A

All levels , need-to-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System design is base on :

A

1) requirements
2) building and fire code
3) integrations with other systems
4) procedural requirements
5) database management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False
Possession of a credentials should automatically guarantee admission to a secured area.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What has become the de facto industry standard?

A

Weigand signal output and data protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Type 1 vs Type 2 error?

A

Type 1 - false reject
Type 2 - false accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ have been in use for more than 100 years and are still considered to be one of the most reliable means of distinguishing one-person from another.

A

Fingerprint biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Locks should not be used as a standalone measure and must :

A

be used with other physical security measures to be effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of locks?

A

Mechanical
Electrified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control Credential Types

A

Photo Badge
Exchange Badge
Stored-Image Badge
Coded Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What generation combined alarms and access, reporting to a central computer where all access decisions were made?

A

Third Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ locks are intrinsically fail-safe because removal of power releases the strike plate.

A

Electromagnetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ mode initiates a claim of identity, presents the specific biometric feature for authorization, and the equipment agrees.

A

Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ mode, the person does not initiate the claim: the biometric device attempts to identify the person, and if the biometric information agrees, entry is allowed.

17
Q

___% of the population is blind or has iris damage and cannot use iris readers.

18
Q

What reader considers displacement, velocity, and acceleration?

19
Q

Where should control panels be located? (ASIS way…)

A

Close to the main entry and exit point

20
Q

Iris scans can be done from ____ to ____ inches away from the scanner’s camra.

21
Q

Electronic crash/panic bars use a delayed egress that when pushed provided __ to ___ seconds of delay after which the door unlocked.

A

15 to 30 seconds

22
Q

Traditional ____and____ systems are still the most commonly used locking system for restricted access.

23
Q

What said fail safe mean?

A

The lock will unlock under any failure situation

24
Q

What is fail secure?

A

The lock will remain locked under any failure situation.

25
What is fail soft?
The lock will operate for a brief period after a failure situation and then will go into fail secure mode.
26
Electronic ACS validates one or more credentials, which can be in the form of :
Something you know Who you are Something you have
27
Mechanical Lock Vulnerabilites:
Surreptitious, force, try/jingle keys, impressioning
28
What are the four functional components of mechanical locks?
Bolt or latch - hold the movable part of the lock to the fixed part of window or door. Strike or keeper - the securer housing that strengthens the frame into which a bolt or latch extends when in locked position. Tumbler Array - barrier that must be aligned to operate the bolt or latch Key or unlocking device - designed to pass the barrier and unlock
29
________ locks were used in the WWII era and have no security benefit. The oldest type of mechanical lock in use today.
Warded
30
_______ locks were first used in he 18th century and operate using flat pieces of metal (levers) that are held in place by a pivot rod and spring tension.
Level
31
______ locks found in automobiles and use flat tumblers that can be master keyed. Low security but can be designed with doubled bitted keys.
Wafer (disk)
32
_______ lock are common on safes and resemble the level lock in many ways. They operate by rotating tumblers to align the gates with the fence and allow the bolt to operate the lock to open.
Dial Combination
33
________ locks do not have a direct relationship to the position of the mechanical dial. They are "claimed" to be immune to vulnerabilities of mechanical type dial as well as magnetic and electrical attacks.
Electric Combination
34
______ locks are the most common used locks. They were developed in 19th century by Linus Yale. They operate using pins and depth setting. For each bitting cut on the key, the internal tumbler has driver pins and key pins with specific depth settings and spring which when aligned by the key to the shear line allows the key cylinder to turn thereby retracting the bolt.
Pin Tumbler
35
______ cores offer a cost effective solution for key loss or theft of keys. The cores can be removed from one lock and relocated to a different lock within the same building.
Reusable
36
_____ are used when a person requires access into multiple areas and rooms but cannot carry all of the keys.
Master Key
37
______ use a shackle rathe than a bolt. The shackle is placed through a hasp to lock.
Padlocks
38
Egress can be broken into three parts
Travel to an exit The exit itself Path to a safe area
39
______ should drive the lock program within an organization.
Written policy