What are the four functions of access control?

Prepare for the DCJS Unarmed Certification Exam with flashcards and multiple choice questions. Each question comes with hints and explanations to help you succeed!

Multiple Choice

What are the four functions of access control?

Explanation:
Access control in physical security is about layering protection so an area stays secure even when one barrier is breached. The four functions work together to stop and slow down intruders and to mobilize a timely response. Delay adds time by using barriers and controlled access points, making it harder for someone to get through quickly. Detection finds that an entry attempt is happening, using sensors, cameras, or monitoring. Alert triggers notification to security personnel or a monitoring center so the event is known and can be acted on. Response is the actions taken to stop the intrusion or mitigate the threat, such as lockdowns, cordons, or contacting authorities. These functions form a practical framework for preventing unauthorized entry and coordinating a quick, effective reaction. The other option reflects steps more related to digital identity management (identifying someone, verifying who they are, deciding what they can do, and keeping records), which is not about physical access control.

Access control in physical security is about layering protection so an area stays secure even when one barrier is breached. The four functions work together to stop and slow down intruders and to mobilize a timely response. Delay adds time by using barriers and controlled access points, making it harder for someone to get through quickly. Detection finds that an entry attempt is happening, using sensors, cameras, or monitoring. Alert triggers notification to security personnel or a monitoring center so the event is known and can be acted on. Response is the actions taken to stop the intrusion or mitigate the threat, such as lockdowns, cordons, or contacting authorities.

These functions form a practical framework for preventing unauthorized entry and coordinating a quick, effective reaction. The other option reflects steps more related to digital identity management (identifying someone, verifying who they are, deciding what they can do, and keeping records), which is not about physical access control.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy