Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 648-247 - Implementing Cisco Connected Physical Security 2 Exam

Page: 1 / 2
Total 52 questions

Refer to the exhibit.

In the event of a loss of connectivity from the Cisco Access Gateway to the expansion modules on the CAN bus, with DC power still connected, what will happen if an access card was presented to a card reader that is connected to one of the Reader Modules?

A.

Reader Module will first try to authenticate the user by attempting to contact the Cisco Access Gateway. Because connectivity is lost, Reader Module will not be able to authenticate, and no access will be granted.

B.

Reader Module will first try to authenticate the user by attempting to contact the Cisco Access Gateway. Because connectivity is lost, Reader Module will fall back to its locally cached credentials and grant access if the card is valid.

C.

Reader Module will first try to authenticate the user using its locally cached credentials. If the credentials are in the local database, access will be granted. If the credentials are not present, Reader Module will attempt to contact the Cisco Access Gateway, time out, and deny access to the user.

D.

Reader Module will sound an audible alarm.

Which of the following statements are true? 1. Eth1 has an IP address of 192.168.1.42, and it cannot be changed.2. The Cisco Access Gateway can only store one firmware version at a time.3. Two readers can be connected to a single Cisco Access Gateway.4. Gateway inputs and outputs can be configured directly on the gateway, without the use of the Cisco Physical Access Manager software.  

A.

All of the statements are true.

B.

Only Statements 1 and 3 are true.

C.

Only Statements 2 and 4 are true.

D.

Statements 2, 3, and 4 are true.

Which devices does Cisco manufacture and sell?

A.

readers, locks, and door position switches

B.

locks, doors, and door hardware

C.

cards, card printers, and readers

D.

Cisco does not manufacture or sell readers, locks, door hardware, or card printers

Cisco Physical Access Manager (Cisco PAM) is an appliance-based solution. The Cisco PAM 1.3.2 appliance is available on which of the following server platforms?

A.

CIVS-MSP-1RU-K9

B.

CPS-MSP-1RU-K9

C.

CPS-MSP-2RU-K9

D.

CIAC-PAME-1125-K9

In a Cisco PAM schedule, what are the available actions for a Schedule type: Access Policy?

A.

Permit only

B.

Deny only

C.

Custom only

D.

Permit and Deny only

E.

Permit, Deny, and Custom

In Cisco PAM, which of the following can trigger an automation rule?

A.

every event that shows in the event monitor

B.

all alarms

C.

external URL trigger

D.

any event that shows in the event monitor, all alarms, or external URL trigger

When adding a new schedule to the Cisco PAM, which of the following policies is not a valid schedule type?

A.

time-based policy

B.

access policy

C.

door policy

D.

event policy

In Cisco PAM, how do you configure items such as DNS, system upgrades, and rebooting of the server?

A.

via a web browser and logging into the Cisco PAM Server Administration web page

B.

by using the Cisco PAM Java Client

C.

Cisco PAM is configured using Cisco VSOM

D.

by using the Cisco PAM EDI Studio application

How should NTP be implemented in a Cisco Physical Access Control Gateway design?

A.

NTP is not required.

B.

NTP should be configured for the Cisco PAM Server only.

C.

NTP should be configured for Cisco Physical Access Control Gateways only.

D.

NTP should be configured on Cisco PAM Servers and gateways.

You need to design a 31-door, networked Cisco Physical Access Control Gateway system. Each door will be controlled by a Cisco Access Gateway, and each Cisco Access Gateway will require its own IP address. Due to the limited number of available IP addresses, the network admin has decided to implement variable-length subnet mask (VLSM) in order to better allocate the available address space. What is the most efficient subnet mask that can be used to handle the 31 IP addresses that are needed for the Cisco Access Gateways?

A.

255.255.255.128 : /25

B.

255.255.255.192 : /26

C.

255.255.255.224 : /27

D.

255.255.255.240 : /28