Search Header Logo

ACS Terms

Authored by Sandy Tay

Education

9th - 12th Grade

Used 9+ times

ACS Terms
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One function of an Access Control System (ACS) is to                

detect unauthorized personnel.

identify the right key for entry and exit.

restrict entry to authorized personnel only.

alert the security guard of an intrusion.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Access Control system, one feature that can be configured to prevent authorized user from allowing his access card to be used by another unauthorized person is

Tailgating.

Authentication.

Anti-passback.

Two person rule.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Access Control System (ACS), the term “Fail Secure” means when power fails, the lock is

locked from the secured area.

locked from the public area.

locked from both sides of the door.

free for access from both sides of the door.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Access Control System (ACS), the term “Fail Safe” means when power fails, the lock is

locked from the secured area.

locked from the public area.

locked from both sides of the door.

free for access from both sides of the door.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Access Control System(ACS), the "Two Person Rule" feature is configured to

prevent tailgating.

ensure more than one authorized person must be present to access to the secure area.

ensure an authorized person use a valid card to gain access to the protected area and use the same card to badge out.

allow every authorized person to gain access to the secure area

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The term used to describe the process of identification by comparing the credential presented at the reader to the system database is

antipassback.

authentication.

man trap.

interlock.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In access control system, "authorization" is BEST described as

all validation checks have passed and access is granted.

the access card has been validated and pending valid finger print at the access point.

an access request is denied.

an unauthorized person follow another person at the controlled gate.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?