This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • Home
  • Magazine
    • Current Issue
    • Digital Editions
    • Archives
    • Monitoring Today
    • Professional Security Canada
  • Products
  • Newswire
  • Exclusives
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
    • PSA Leadership Institute
  • Topics
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • Columns
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Today's Systems Integrator
    • Marketing Madmen
    • Sales Stars
    • Smart Insights
  • Events
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • More
    • Videos
    • Podcasts
    • ISC West 2019
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • Directories
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • Contact
  • Advertise
Home » Field Guide to Access Control: 20 Questions about Access Control

Field Guide to Access Control: 20 Questions about Access Control

September 1, 2006
Reprints
No Comments

Access control installations can be a complex arrangement of controllers, readers, user credentials, and door hardware – all designed to function like clockwork based on myriad programming selections. To determine if you are knowledgeable about access control installation and programming, take our 20 Questions quiz. Then turn to page 30 and find out how you scored.

  1. The most popular access control credential technology used today is:
    1. Magnetic stripe
    2. Wiegand swipe readers
    3. Proximity
    4. Bar code

  2. Wiegand protocol readers are wired to access controller panels using:
    1. Cat 5e UTP
    2. Cat 3 UTP
    3. RG-6
    4. 18-gauge five-conductor with an overall shield

  3. Wiegand protocols can be transmitted as:
    1. 37 bits
    2. 32 bits
    3. 26 bits
    4. all of the above

  4. An access system's “site code” is:
    1. an identification number that's included in each access credential
    2. the access controller panel’s MAC address
    3. the client’s access software activation code
    4. the installer’s account number

  5. Standard proximity credential readers have a two-foot “read” distance.
    1. True
    2. False

  6. Typically, biometric access control devices cannot read:
    1. palm prints
    2. fingerprints
    3. human irises
    4. human pulse rates

  7. Electronic REX devices are typically connected directly to credential readers.
    1. True
    2. False

  8. A door release that goes “open” when power fails is considered:
    1. fail-secure
    2. fail-safe

  9. The most important issue when planning an access control system is:
    1. the number of credentials to be issued.
    2. the number of doors to be secured.
    3. life safety and AHJ approval.
    4. how fast credentials can be read and access allowed.

  10. Door releases, such as strikes and magnetic locks, typically are powered by:
    1. self-contained batteries.
    2. separate power supplies.
    3. AC
    4. power from the access controller panel.

  11. The average number of credentials in a typical access control application is:
    1. 50
    2. 100
    3. 200
    4. 500

  12. Access controller panels can communicate with the host computer via:
    1. Ethernet
    2. Internet
    3. RS-485
    4. telephone modem

  13. Keypad access control input devices provide high-speed, high-volume entry functions.
    1. True
    2. False

  14. Select the incorrect answer. Door position switches:
    1. also can be connected to intrusion alarm systems.
    2. provide door close/open status to the access control system.
    3. can be contained in hinges.
    4. can be surface mount or concealed.

  15. Which type of system typically provides real-time monitoring and reporting of access control events?
    1. Mid-sized systems.
    2. Enterprise-level systems.

  16. Electronic REXs should be protected with bridge rectifier circuits when connected to a magnetic lock or door strike.
    1. True
    2. False

  17. Proximity readers can be used as direct replacements for magnetic stripe readers, while retaining the existing host system.
    1. True
    2. False

  18. The current draw of a typical door strike is:
    1. 1.5 amps @ 24 VDC
    2. 2 amps @ 24 VDC
    3. 300 milliamps @ 24 VDC
    4. 150 milliamps @ 24 VDC

  19. When two or more people pass through an access door when only one credential is presented, this is called:
    1. cheating the system
    2. papoosing
    3. tailgating
    4. a “spare tire”

  20. Secure funneling is when two or more doors are logically connected so that one door must be closed before another door can be opened.
    1. True
    2. False

Check your answers below.

Help Complete this Door Installation

The door illustrated at this facility is used for both entering and leaving the building. The door has a push bar to exit. What devices are missing from this installation?

Answer below.







Why Does Door Strike Release from the Inside?

When some authorized users walk past this door from the inside, they hear the door strike release. What's causing this?

Answer below.







20 answers

  1. c
  2. d – In most cases six-conductor OAS (over all shielded) is installed, as cable manufacturers don’t regularly manufacture equivalent five-conductor. It’s important to properly connect the reader cables shielding to ground.
  3. d – Card populations can be purchased with different bit formats.
  4. a – The site code (also called a facility code) is like the prefix of a telephone number and is included in the data string of each credential issued for a particular system.
  5. False
  6. d – Human pulse rate. Biometric readers can be purchased that can read all of the other listed inputs.
  7. False – Credential readers are usually connected to an access controller panel.
  8. b – Fail-safe.
  9. c – Life safety and AHJ approval.
  10. b – Separate power supplies.
  11. c – 200.
  12. a, b, c, and d – The communications capability of particular access controller panels can be one or multiple methods.
  13. False – Keypads are slower than cards or “hard” credentials, as the user must remember his or her number and punch it in.
  14. a – Door position switches should not be connected to both the access control system and the intrusion alarm system, unless the switch selected is DPDT (double pole, double throw) which provides electrically separate connections to the respective systems.
  15. b
  16. True – Some magnetic locks and strikes have electric spike protection built in (this is sometimes called diode protected). If the door release isn’t internally protected, a bridge rectifier circuit should be connected.
  17. True
  18. d – Door-release devices operating at 12 VDC typically have a higher current requirement than those that operate at 24 VDC do.
  19. c.
  20. False – The correct term is “mantrap.”


Answer to: Help Complete This Door Installation

If the door is also regularly used for egress, either another card reader or request to exit device must be installed on the interior side, so that people exiting the door will not generate an alarm on the access control system.

Answer to: Why Does Door Strike Release from the Inside?

Proximity readers can have detection fields that extend both in front of and behind the reader. If a person has his or her proximity credential in a pocket or purse, the reader may inadvertently read the credential when it nears the door. Installing a metal plate behind the reader will reduce or eliminate this problem.
Subscribe to SDM Magazine

Related Articles

FIELD GUIDE TO ACCESS CONTROL: 20 Questions about Skill Sharpener

FIELD GUIDE TO NETWORKING: 20 Questions About Networking

FIELD GUIDE TO MONITORING: 20 Questions About Monitoring

FIELD GUIDE TO MONITORING: 20 Questions about Monitoring

Related Products

Physical Security and Safety: A Field Guide for the Practitioner

The Complete Guide to Physical Security

SDM Buyers Guide

SDM Magazine October 2018 Distributors Guide

Related Directories

Access Hardware Supply

DSX Access Systems Inc.

Access Specialties International LLC

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • SDM eNewsletter & Other eNews Alerts
  • Online Registration
  • Subscription Customer Service

More Videos

Sponsored Content What Is Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the SDM audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Featureimage_900x550__ovl0jlkbbj__
Sponsored By
Schneider Electric

New Digital Load Management System Drives Productivity and Enables New Business Models

Motor starter selection and configuration has always been a labor-intensive task. To address this challenge, machine builders and system integrators must adopt new technologies that simplify motor starter selection, installation, configuration and maintenance.

Popular Stories

ACT365-ipad

3 Reasons You Should Be Offering Cloud-Based Access Control

Connect Community Service

Resideo’s First Solo CONNECT Conference Puts the Focus on the Pros

Axis ACCC conference 2019

Messages from 14th ACCC: Openness & Partnerships

Supreme Security Systems

Supreme Security Systems Acquires T&R Alarm Systems

STANLEY

STANLEY Security Partners With Indianapolis Colts to Honor Local ‘Security Champion’

SDM 2019 Top Systems Integrators Report

Events

January 1, 2030

Webinar Sponsorship Information

For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

View All Submit An Event

Poll

Hiring Women in Security

Has your company made any efforts in the past year to specifically hire and/or promote women in managerial/executive positions? (Please select the best answer.)
View Results Poll Archive

Products

Contemporary Security Management, 4th Edition

Contemporary Security Management, 4th Edition

 Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. 

See More Products

SDM Magazine

SEC-December-2019-Cover_144px

2019 December

Check out SDM Magazine’s December 2019 issue, featuring "CPI’s Key to Success Is Controlling ‘the Experience’ in-House", "Monitoring Services: The Cutting Edge", and much more.

Check back throughout the month for new content!

View More Create Account
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing