1. Magnetic stripe access cards are more secure than proximity-based credentials.
    a. True
    b. False

  2. HSPD-12 was issued to establish a standard for:
    a. operation of access control software.
    b. identification of federal employees and contractors.
    c. video badging systems.
    d. None of the above

  3. Access control systems can:
    a. control elevator access.
    b. provide time and attendance tracking.
    c. restrict access to sensitive areas.
    d. All of the above

  4. What communication protocol do network-based access systems utilize to communicate across a LAN or WAN?
    a. RS-232
    b. RS-485
    c. TCP/IP
    d. None of the above

  5. Among other things, FIPS 201 covers enrollment and issuance of credentials.
    a. True
    b. False

  6. Network-based access control systems can be remotely administered over:
    a. the Internet.
    b. a LAN.
    c. a WAN.
    d. All of the above
    e. None of the above

  7. Access control systems can be incorporated into some central station automation software packages.
    a. True
    b. False

  8. 125 KHz is a typical frequency used by proximity card technology.
    a. True
    b. False

  9. Smart cards can be used for:
    a. access control.
    b. computer access.
    c. point-of-sale vending.
    d. Any of the above

  10. Readers are available that can read both traditional proximity cards as well as new contactless smart cards.
    a. True
    b. False

  11. What communication protocol can be used between access controllers within a facility?
    a. RS-232
    b. RS-485
    c. TCP/IP
    d. Any of the above
    e. None of the above

  12. Wireless devices cannot be used for access control systems.
    a. True
    b. False

  13. All access control systems require an on-site computer.
    a. True
    b. False
     
  14. Hot redundant servers are not available for access control systems.
    a. True
    b. False

  15. What of the following cable types should be used to connect a networked access communication server to the network switch?
    a. 22/4 plenum
    b. 18/4 shielded
    c. Cat 5e
    d. Any of the above


What’s Wrong with This?

Wally `Larman installed a network-connected access control system utilizing four standard Weigand proximity readers connected to a four-door controller. He prewired the installation using Cat 5e cables for the readers, controller and server communication paths as shown in this diagram. Everything seemed to be going great, but when it came time to install the readers, Wally ran into a problem.  Can you see what Wally did wrong and what he must do to correct the problem?

5-Minute Tech Quiz Answers

1. b

2. b — HSPD-12 Homeland Security Presidential Directive 12 issued in 2004 established a standard for the identification of all federal employees and contractors.

3. d

4. c — Although access controllers may use RS-485 or RS-232 to communicate with the communication server, the protocol used when connecting the communication server to an existing LAN or WAN is the industry standard TCP/IP.

5. a — FIPS 201, the Federal Identity Processing Standard, specifies Personal Identity Verification (PIV) for Federal employees and contractors and the technical requirements for common identification standard to achieve appropriate security assurance for multiple applications.

6. d

7. a — Incorporating remotely monitored access control systems into existing central station automation software allows the central station personnel to use the same familiar software to monitor access systems as they use to monitor alarm signals.

8. a

9. d

10. a

11. d — Any of these communication protocols can be used depending upon the manufac-turer and design requirements of the installation.

12. b

13. b — Some systems are specifically designed so that no local computer is required, reducing the initial cost and simplifying the user’s interaction with the system.

14. b

15. c — Although Cat 5e or better is used to connect the access communication server to the network, other cable types may be necessary to connect readers, locks, request-to-exit devices and controllers.

Answer to: What's Wrong with This?

Wally’s problem is caused by the type of cable he ran for the readers. Cat 5e cable should be used for network communications, but typical Weigand readers require a shielded cable. Wally should replace the Cat 5e reader cables with an appropriate shielded cable, such as 18/6 shielded, and connect the readers according to the manufacturer’s installation instructions. You should always check to see what type of cable is required for each device before starting any prewire.