The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
What’s Wrong With This?Can you identify any issues with the installation depicted in the attached photo, if any?
2.
The major components of an access control system are ________.
A.
A. electronic hardware, cables, access cards, power supply
B.
B. controllers, cards, computer, software
C.
C. card readers, locks, controllers, cables
D.
D. door controllers, readers, cards, computer
Correct Answer
D. D. door controllers, readers, cards, computer
Explanation An access control system typically consists of door controllers, readers, cards, and a computer. Door controllers are responsible for managing access to specific doors or entry points, readers are used to read access cards or credentials, cards are issued to authorized individuals for access, and a computer is used to manage and monitor the access control system. Therefore, option d is the correct answer as it includes all the major components of an access control system.
Rate this question:
3.
An advantage of a magstripe format over a Wiegand format is:
A.
A. Magstripe data can accommodate more unique card ID numbers.
B.
B. Wiegard can be encrypted but a magstripe cannot.
C.
C. Magstripes erase much more easily than Wiegands.
D.
D. Magstripe is for a larger number of door controllers.
Correct Answer
A. A. Magstripe data can accommodate more unique card ID numbers.
Explanation The advantage of a magstripe format over a Wiegand format is that magstripe data can accommodate more unique card ID numbers. This means that a magstripe format can support a larger number of cardholders or users compared to a Wiegand format.
Rate this question:
4.
The card ID number in a magstripe ________.
A.
A. is 26 decadecimal digits
B.
B. is 14 hexadecimal digits
C.
C. starts with and ends with zero.
D.
D. is preceded by five zeros.
Correct Answer
B. B. is 14 hexadecimal digits
Explanation The correct answer is b. The card ID number in a magstripe is 14 hexadecimal digits. Hexadecimal digits are a combination of numbers 0-9 and letters A-F, allowing for a larger range of possible values compared to decimal digits. A 14-digit ID number provides enough unique combinations to accommodate a large number of cards.
Rate this question:
5.
Why are keypads less secure than card readers?
A.
A. People forget their PIN numbers.
B.
B. ID cards are easily duplicated.
C.
C. PIN numbers are not difficult to obtain.
D.
D. They can be used only on doors with an electric strike.
Correct Answer
C. C. PIN numbers are not difficult to obtain.
Explanation Keypads are less secure than card readers because PIN numbers are not difficult to obtain. Unlike ID cards, which can be difficult to duplicate, PIN numbers can be easily guessed, stolen, or observed by someone nearby. This makes keypads more vulnerable to unauthorized access compared to card readers, which rely on physical possession of a unique ID card.
Rate this question:
6.
The proper wire run for a Wiegand reader is ________.
A.
A. 16/2
B.
B. 18/4
C.
C. 22/6 shield
D.
D. 18/6 FPL
Correct Answer
C. C. 22/6 shield
Explanation C – to avoid interference, shielded cable is recommended for card reader runs
Rate this question:
7.
Fail safe locks are engaged when power fails
A.
A. True
B.
B. False
Correct Answer
B. B. False
Explanation Fail safe locks are not engaged when power fails. In fact, fail safe locks are designed to disengage when power fails in order to ensure the safety of individuals. This allows people to exit a building or a room in case of an emergency, even if the power is out. Therefore, the correct answer is false.
Rate this question:
8.
To calculate voltage drop, which of the following should be used?
A.
A. Ohm’s Law
B.
B. Olin’s Law
C.
C. Murphy’s Law
D.
D. Kirchoff’s Law
Correct Answer
A. A. Ohm’s Law
Explanation A – Ohm’s law shows the relationship between voltage, resistance and current
Rate this question:
9.
Grommets or bushings are required only when running non-shielded cable through metal studs.
A.
A. True
B.
B. False
Correct Answer
B. B. False
Explanation Grommets or bushings are required not only when running non-shielded cable through metal studs, but also when running any type of cable through metal studs. The purpose of grommets or bushings is to protect the cable from sharp edges and prevent damage to the insulation. Therefore, the statement that grommets or bushings are required only when running non-shielded cable through metal studs is false.
Rate this question:
10.
Identification of an individual based on a physical characteristic is called ________.
A.
A. facial recognition
B.
B. fingerprint scans
C.
C. biometrics
D.
D. retinal scans
Correct Answer
C. C. biometrics
Explanation Biometrics refers to the identification of an individual based on a physical characteristic. This can include various methods such as facial recognition, fingerprint scans, and retinal scans. Biometric technology has become increasingly popular in recent years due to its accuracy and security. It is commonly used in areas such as access control, authentication, and identification systems.
Rate this question:
11.
Which of the following must be considered when selecting locking hardware for a door?
A.
A. color of the existing door hardware
B.
B. size and spacing of door hinges
C.
C. location to the nearest fire exit
D.
D. price
Correct Answer
A. A. color of the existing door hardware
Explanation When selecting locking hardware for a door, the color of the existing door hardware must be considered. This is because the color of the locking hardware should match or complement the color of the existing door hardware to maintain a cohesive and aesthetically pleasing look.
Rate this question:
12.
RS422/RS485 can be transmitted farther than RS232.
A.
A. True
B.
B. False
Correct Answer
A. A. True
Explanation RS422/RS485 can be transmitted farther than RS232 because they use differential signaling, which means they transmit data using two wires instead of one. This allows for better noise immunity and longer transmission distances. RS232, on the other hand, uses single-ended signaling, which is more susceptible to noise and has shorter transmission distances. Therefore, the statement that RS422/RS485 can be transmitted farther than RS232 is true.
Rate this question:
13.
Barcode technology is one of the most secure methods of access control.
A.
A. True
B.
B. False
C.
Option 3
D.
Option 4
Correct Answer
B. B. False
Explanation B – barcodes are not very secure since they can be easily reproduced
Rate this question:
14.
Maglocks are ________.
A.
A. fail safe
B.
B. fail secure
C.
C. no longer used
D.
D. illegal in public places
Correct Answer
A. A. fail safe
Explanation A – maglocks require power to be energized. When power fails, so does the lock, thereby allowing the door to be opened.
Rate this question:
15.
Which of the following is not a factor in the decision of a controller to release a door?
A.
A. the name and title of the person presenting the card
B.
B. date and time
C.
C. the ID number of the card presented
D.
D. the location of the card reader in relation to the card presented.
Correct Answer
A. A. the name and title of the person presenting the card
Explanation A – while the name and title of a person may be loaded into the software, it is not used to make the determination of allowing or blocking access
Rate this question:
16.
Distributed processing means ________.
A.
A. decisions regarding access are made at the local controller
B.
B. the administrator hands out access cards at multiple locations for convenience of the customer
C.
C. after a loss of communications, the system continues to allow access
D.
D. both A & C
Correct Answer
D. D. both A & C
Explanation Distributed processing refers to a system where decisions regarding access are made at the local controller, meaning that each individual controller has the authority to grant or deny access. Additionally, in a distributed processing system, even if there is a loss of communications between controllers, the system continues to allow access. Therefore, the correct answer is both A and C.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.