-
Magnetic stripe access cards are more secure than proximity-based
credentials.
a. True
b. False
-
HSPD-12 was issued to establish a standard for:
a. operation of access control software.
b. identification of federal employees and contractors.
c. video badging systems.
d. None of the above
-
Access control systems can:
a. control elevator access.
b. provide time and attendance tracking.
c. restrict access to sensitive areas.
d. All of the above
-
What communication protocol do network-based access systems utilize
to communicate across a LAN or WAN?
a. RS-232
b. RS-485
c. TCP/IP
d. None of the above
-
Among other things, FIPS 201 covers enrollment and issuance of
credentials.
a. True
b. False
-
Network-based access control systems can be remotely administered
over:
a. the Internet.
b. a LAN.
c. a WAN.
d. All of the above
e. None of the above
-
Access control systems can be incorporated into some central station
automation software packages.
a. True
b. False
-
125 KHz is a typical frequency used by proximity card technology.
a. True
b. False
-
Smart cards can be used for:
a. access control.
b. computer access.
c. point-of-sale vending.
d. Any of the above
-
Readers are available that can read both traditional proximity cards
as well as new contactless smart cards.
a. True
b. False
-
What communication protocol can be used between access controllers
within a facility?
a. RS-232
b. RS-485
c. TCP/IP
d. Any of the above
e. None of the above
-
Wireless devices cannot be used for access control systems.
a. True
b. False
-
All access control systems require an on-site computer.
a. True
b. False
-
Hot redundant servers are not available for access control systems.
a. True
b. False
-
What of the following cable types should be used to connect a
networked access communication server to the network switch?
a. 22/4 plenum
b. 18/4 shielded
c. Cat 5e
d. Any of the above
What’s Wrong with This?
Wally `Larman installed a network-connected access control system utilizing four standard Weigand proximity readers connected to a four-door controller. He prewired the installation using Cat 5e cables for the readers, controller and server communication paths as shown in this diagram. Everything seemed to be going great, but when it came time to install the readers, Wally ran into a problem. Can you see what Wally did wrong and what he must do to correct the problem?5-Minute Tech Quiz Answers
1. b2. b — HSPD-12 Homeland Security Presidential Directive 12 issued in 2004 established a standard for the identification of all federal employees and contractors.
3. d
4. c — Although access controllers may use RS-485 or RS-232 to communicate with the communication server, the protocol used when connecting the communication server to an existing LAN or WAN is the industry standard TCP/IP.
5. a — FIPS 201, the Federal Identity Processing Standard, specifies Personal Identity Verification (PIV) for Federal employees and contractors and the technical requirements for common identification standard to achieve appropriate security assurance for multiple applications.
6. d
7. a — Incorporating remotely monitored access control systems into existing central station automation software allows the central station personnel to use the same familiar software to monitor access systems as they use to monitor alarm signals.
8. a
9. d
10. a
11. d — Any of these communication protocols can be used depending upon the manufac-turer and design requirements of the installation.
12. b
13. b — Some systems are specifically designed so that no local computer is required, reducing the initial cost and simplifying the user’s interaction with the system.
14. b
15. c — Although Cat 5e or better is used to connect the access communication server to the network, other cable types may be necessary to connect readers, locks, request-to-exit devices and controllers.