Ins And Outs Of Access Control

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Henryebnpmedia
H
Henryebnpmedia
Community Contributor
Quizzes Created: 6 | Total Attempts: 1,373
| Attempts: 267 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. To calculate voltage drop, which of the following should be used?

Explanation

A – Ohm’s law shows the relationship between voltage, resistance and current

Submit
Please wait...
About This Quiz
Ins And Outs Of Access Control - Quiz

Explore the Ins and Outs of Access Control through this quiz, focusing on key components, security formats, and technologies. Understand different aspects of access control systems including door... see morecontrollers, magstripe and Wiegand formats, and the significance of secure setups in maintaining effective security measures. see less

2. RS422/RS485 can be transmitted farther than RS232.

Explanation

RS422/RS485 can be transmitted farther than RS232 because they use differential signaling, which means they transmit data using two wires instead of one. This allows for better noise immunity and longer transmission distances. RS232, on the other hand, uses single-ended signaling, which is more susceptible to noise and has shorter transmission distances. Therefore, the statement that RS422/RS485 can be transmitted farther than RS232 is true.

Submit
3. Grommets or bushings are required only when running non-shielded cable through metal studs.

Explanation

Grommets or bushings are required not only when running non-shielded cable through metal studs, but also when running any type of cable through metal studs. The purpose of grommets or bushings is to protect the cable from sharp edges and prevent damage to the insulation. Therefore, the statement that grommets or bushings are required only when running non-shielded cable through metal studs is false.

Submit
4. Maglocks are ________.

Explanation

A – maglocks require power to be energized. When power fails, so does the lock, thereby allowing the door to be opened.

Submit
5. Identification of an individual based on a physical characteristic is called  ________.

Explanation

Biometrics refers to the identification of an individual based on a physical characteristic. This can include various methods such as facial recognition, fingerprint scans, and retinal scans. Biometric technology has become increasingly popular in recent years due to its accuracy and security. It is commonly used in areas such as access control, authentication, and identification systems.

Submit
6. Barcode technology is one of the most secure methods of access control.

Explanation

B – barcodes are not very secure since they can be easily reproduced

Submit
7. Why are keypads less secure than card readers?

Explanation

Keypads are less secure than card readers because PIN numbers are not difficult to obtain. Unlike ID cards, which can be difficult to duplicate, PIN numbers can be easily guessed, stolen, or observed by someone nearby. This makes keypads more vulnerable to unauthorized access compared to card readers, which rely on physical possession of a unique ID card.

Submit
8. The proper wire run for a Wiegand reader is ________.

Explanation

C – to avoid interference, shielded cable is recommended for card reader runs

Submit
9. Distributed processing means   ________.

Explanation

Distributed processing refers to a system where decisions regarding access are made at the local controller, meaning that each individual controller has the authority to grant or deny access. Additionally, in a distributed processing system, even if there is a loss of communications between controllers, the system continues to allow access. Therefore, the correct answer is both A and C.

Submit
10. An advantage of a magstripe format over a Wiegand format is:

Explanation

The advantage of a magstripe format over a Wiegand format is that magstripe data can accommodate more unique card ID numbers. This means that a magstripe format can support a larger number of cardholders or users compared to a Wiegand format.

Submit
11. Fail safe locks are engaged when power fails

Explanation

Fail safe locks are not engaged when power fails. In fact, fail safe locks are designed to disengage when power fails in order to ensure the safety of individuals. This allows people to exit a building or a room in case of an emergency, even if the power is out. Therefore, the correct answer is false.

Submit
12. Which of the following is not a factor in the decision of a controller to release a door?

Explanation

A – while the name and title of a person may be loaded into the software, it is not used to make the determination of allowing or blocking access

Submit
13. The major components of an access control system are ________.

Explanation

An access control system typically consists of door controllers, readers, cards, and a computer. Door controllers are responsible for managing access to specific doors or entry points, readers are used to read access cards or credentials, cards are issued to authorized individuals for access, and a computer is used to manage and monitor the access control system. Therefore, option d is the correct answer as it includes all the major components of an access control system.

Submit
14. The card ID number in a magstripe  ________.

Explanation

The correct answer is b. The card ID number in a magstripe is 14 hexadecimal digits. Hexadecimal digits are a combination of numbers 0-9 and letters A-F, allowing for a larger range of possible values compared to decimal digits. A 14-digit ID number provides enough unique combinations to accommodate a large number of cards.

Submit
15. Which of the following must be considered when selecting locking hardware for a door?

Explanation

When selecting locking hardware for a door, the color of the existing door hardware must be considered. This is because the color of the locking hardware should match or complement the color of the existing door hardware to maintain a cohesive and aesthetically pleasing look.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 01, 2016
    Quiz Created by
    Henryebnpmedia
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
To calculate voltage drop, which of the following should be used?
RS422/RS485 can be transmitted farther than RS232.
Grommets or bushings are required only when running non-shielded cable...
Maglocks are ________.
Identification of an individual based on a physical characteristic is...
Barcode technology is one of the most secure methods of access...
Why are keypads less secure than card readers?
The proper wire run for a Wiegand reader is ________.
Distributed processing means   ________.
An advantage of a magstripe format over a Wiegand format is:
Fail safe locks are engaged when power fails
Which of the following is not a factor in the decision of a controller...
The major components of an access control system are ________.
The card ID number in a magstripe  ________.
Which of the following must be considered when selecting locking...
Alert!

Advertisement