Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
The basic function of an access control system is
authorized by validating input using encrypted credentials in conjunction with:
a. | Software and / or a data base containing the input
parameters | b. | The first cable
cards (Wiegand) that identifies who, what, when and where | c. | The failsafe mechanism (fail safe) you need to take priority over
safety | d. | At least one biometric reading to prohibit happen again
(anti-passback) |
|
|
2.
|
A system that requires a credential to exit the
area code is:
a. | egress | b. | free egress | c. | controlled
discharge | d. | Time drift |
|
|
3.
|
Fail-safe (secure fail) it is one who remains
secured when not powered:
|
|
4.
|
The following functions of physical protection
systems, covert penetration of a system is more likely to be restricted by:
a. | System Response | b. | Tailgating |
|
|
5.
|
Prohibit is implemented again pass (anti-passback)
is typically implemented for control systems using input:
a. | special barriers | b. | Tracking | c. | Encoded
credentials | d. | IR
sensors |
|
|
6.
|
Entry control systems typically use high
security:
a. | Keyboards to enter PIN | b. | Credentials to insert or swipe credentials | c. | biometric readers | d. | Proximity
Credentials |
|
|
7.
|
In (non-staffed) control systems without staff
input, tailgating people are more likely to be detected by:
a. | Sensors buried near the access
point | b. | Multiple IR and algorithm
patterns | c. | Tourniquets or turnstiles | d. | None of the above |
|
|
8.
|
How easy and fast penetration can occur it is
determined by:
a. | Strength of the barrier to
entry | b. | Amount of memory on the
computer | c. | Number of sub-controllers | d. | Scalability control system |
|
|
9.
|
One type of coded card that can be replicated
fairly easily is:
a. | Proximity card | b. | Card wire (Wiegand) | c. | smart
Cards | d. | Cards with magnetic
strips |
|
|
10.
|
Non-encrypted classified information is transmitted
through a cable or fiber optic telecommunications system, and requires a protection system for
distribution systems. What are the categories that exist for the protection of distribution
systems:
a. | Hardened distribution systems | b. | Simple distribution systems | c. | all of the above |
|
|
11.
|
A hardened support data cables must be installed in
support metal pipe, the connectors must be permanently sealed and under continuous observation 24
hours.
|
|
12.
|
To ensure continuous operation during a loss of
electrical service, bateriasde support should be provided for:
a. | drivers | b. | Card Readers | c. | Sensors card
wire | d. | biometric relays |
|