Ins And Outs Of Access Control

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Henryebnpmedia
H
Henryebnpmedia
Community Contributor
Quizzes Created: 6 | Total Attempts: 1,304
Questions: 16 | Attempts: 245

SettingsSettingsSettings
Ins And Outs Of Access Control - Quiz

Take the latest 5 Minute Tech Quiz.


Questions and Answers
  • 1. 

    What’s Wrong With This?Can you identify any issues with the installation depicted in the attached photo, if any?

  • 2. 

    The major components of an access control system are ________.

    • A.

      A. electronic hardware, cables, access cards, power supply

    • B.

      B. controllers, cards, computer, software

    • C.

      C. card readers, locks, controllers, cables

    • D.

      D. door controllers, readers, cards, computer

    Correct Answer
    D. D. door controllers, readers, cards, computer
    Explanation
    An access control system typically consists of door controllers, readers, cards, and a computer. Door controllers are responsible for managing access to specific doors or entry points, readers are used to read access cards or credentials, cards are issued to authorized individuals for access, and a computer is used to manage and monitor the access control system. Therefore, option d is the correct answer as it includes all the major components of an access control system.

    Rate this question:

  • 3. 

    An advantage of a magstripe format over a Wiegand format is:

    • A.

      A. Magstripe data can accommodate more unique card ID numbers.

    • B.

      B. Wiegard can be encrypted but a magstripe cannot.

    • C.

      C. Magstripes erase much more easily than Wiegands.

    • D.

      D. Magstripe is for a larger number of door controllers.

    Correct Answer
    A. A. Magstripe data can accommodate more unique card ID numbers.
    Explanation
    The advantage of a magstripe format over a Wiegand format is that magstripe data can accommodate more unique card ID numbers. This means that a magstripe format can support a larger number of cardholders or users compared to a Wiegand format.

    Rate this question:

  • 4. 

    The card ID number in a magstripe  ________.

    • A.

      A. is 26 decadecimal digits

    • B.

      B. is 14 hexadecimal digits

    • C.

      C. starts with and ends with zero.

    • D.

      D. is preceded by five zeros.

    Correct Answer
    B. B. is 14 hexadecimal digits
    Explanation
    The correct answer is b. The card ID number in a magstripe is 14 hexadecimal digits. Hexadecimal digits are a combination of numbers 0-9 and letters A-F, allowing for a larger range of possible values compared to decimal digits. A 14-digit ID number provides enough unique combinations to accommodate a large number of cards.

    Rate this question:

  • 5. 

    Why are keypads less secure than card readers?

    • A.

      A. People forget their PIN numbers.

    • B.

      B. ID cards are easily duplicated.

    • C.

      C. PIN numbers are not difficult to obtain.

    • D.

      D. They can be used only on doors with an electric strike.

    Correct Answer
    C. C. PIN numbers are not difficult to obtain.
    Explanation
    Keypads are less secure than card readers because PIN numbers are not difficult to obtain. Unlike ID cards, which can be difficult to duplicate, PIN numbers can be easily guessed, stolen, or observed by someone nearby. This makes keypads more vulnerable to unauthorized access compared to card readers, which rely on physical possession of a unique ID card.

    Rate this question:

  • 6. 

    The proper wire run for a Wiegand reader is ________.

    • A.

      A. 16/2

    • B.

      B. 18/4

    • C.

      C. 22/6 shield

    • D.

      D. 18/6 FPL

    Correct Answer
    C. C. 22/6 shield
    Explanation
    C – to avoid interference, shielded cable is recommended for card reader runs

    Rate this question:

  • 7. 

    Fail safe locks are engaged when power fails

    • A.

      A. True

    • B.

      B. False

    Correct Answer
    B. B. False
    Explanation
    Fail safe locks are not engaged when power fails. In fact, fail safe locks are designed to disengage when power fails in order to ensure the safety of individuals. This allows people to exit a building or a room in case of an emergency, even if the power is out. Therefore, the correct answer is false.

    Rate this question:

  • 8. 

    To calculate voltage drop, which of the following should be used?

    • A.

      A. Ohm’s Law

    • B.

      B. Olin’s Law

    • C.

      C. Murphy’s Law

    • D.

      D. Kirchoff’s Law

    Correct Answer
    A. A. Ohm’s Law
    Explanation
    A – Ohm’s law shows the relationship between voltage, resistance and current

    Rate this question:

  • 9. 

    Grommets or bushings are required only when running non-shielded cable through metal studs.

    • A.

      A. True

    • B.

      B. False

    Correct Answer
    B. B. False
    Explanation
    Grommets or bushings are required not only when running non-shielded cable through metal studs, but also when running any type of cable through metal studs. The purpose of grommets or bushings is to protect the cable from sharp edges and prevent damage to the insulation. Therefore, the statement that grommets or bushings are required only when running non-shielded cable through metal studs is false.

    Rate this question:

  • 10. 

    Identification of an individual based on a physical characteristic is called  ________.

    • A.

      A. facial recognition

    • B.

      B. fingerprint scans

    • C.

      C. biometrics

    • D.

      D. retinal scans

    Correct Answer
    C. C. biometrics
    Explanation
    Biometrics refers to the identification of an individual based on a physical characteristic. This can include various methods such as facial recognition, fingerprint scans, and retinal scans. Biometric technology has become increasingly popular in recent years due to its accuracy and security. It is commonly used in areas such as access control, authentication, and identification systems.

    Rate this question:

  • 11. 

    Which of the following must be considered when selecting locking hardware for a door?

    • A.

      A. color of the existing door hardware

    • B.

      B. size and spacing of door hinges

    • C.

      C. location to the nearest fire exit

    • D.

      D. price

    Correct Answer
    A. A. color of the existing door hardware
    Explanation
    When selecting locking hardware for a door, the color of the existing door hardware must be considered. This is because the color of the locking hardware should match or complement the color of the existing door hardware to maintain a cohesive and aesthetically pleasing look.

    Rate this question:

  • 12. 

    RS422/RS485 can be transmitted farther than RS232.

    • A.

      A. True

    • B.

      B. False

    Correct Answer
    A. A. True
    Explanation
    RS422/RS485 can be transmitted farther than RS232 because they use differential signaling, which means they transmit data using two wires instead of one. This allows for better noise immunity and longer transmission distances. RS232, on the other hand, uses single-ended signaling, which is more susceptible to noise and has shorter transmission distances. Therefore, the statement that RS422/RS485 can be transmitted farther than RS232 is true.

    Rate this question:

  • 13. 

    Barcode technology is one of the most secure methods of access control.

    • A.

      A. True

    • B.

      B. False

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    B. B. False
    Explanation
    B – barcodes are not very secure since they can be easily reproduced

    Rate this question:

  • 14. 

    Maglocks are ________.

    • A.

      A. fail safe

    • B.

      B. fail secure

    • C.

      C. no longer used

    • D.

      D. illegal in public places

    Correct Answer
    A. A. fail safe
    Explanation
    A – maglocks require power to be energized. When power fails, so does the lock, thereby allowing the door to be opened.

    Rate this question:

  • 15. 

    Which of the following is not a factor in the decision of a controller to release a door?

    • A.

      A. the name and title of the person presenting the card

    • B.

      B. date and time

    • C.

      C. the ID number of the card presented

    • D.

      D. the location of the card reader in relation to the card presented.

    Correct Answer
    A. A. the name and title of the person presenting the card
    Explanation
    A – while the name and title of a person may be loaded into the software, it is not used to make the determination of allowing or blocking access

    Rate this question:

  • 16. 

    Distributed processing means   ________.

    • A.

      A. decisions regarding access are made at the local controller

    • B.

      B. the administrator hands out access cards at multiple locations for convenience of the customer

    • C.

      C. after a loss of communications, the system continues to allow access

    • D.

      D. both A & C

    Correct Answer
    D. D. both A & C
    Explanation
    Distributed processing refers to a system where decisions regarding access are made at the local controller, meaning that each individual controller has the authority to grant or deny access. Additionally, in a distributed processing system, even if there is a loss of communications between controllers, the system continues to allow access. Therefore, the correct answer is both A and C.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 01, 2016
    Quiz Created by
    Henryebnpmedia
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.