Virtual of 648-247 test materials and prep for Cisco certification for IT professionals, Real Success Guaranteed with Updated 648-247 pdf dumps vce Materials. 100% PASS Implementing Cisco Connected Physical Security 2 Exam exam Today!
2026 New 648-247 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/648-247/
Q1. Which of the following databases are supported by the EDI module to import credentials (badge)?
A. MySQL, Oracle, Microsoft Active Directory, and SQL
B. MySQL, Oracle, SAP, and SQL
C. MySQL, Oracle, and SQL
D. MySQL, Informix, Oracle, SQL, and Microsoft Active Directory
Answer: C
Q2. In Cisco PAM, how do you configure items such as doors, events, and reports?
A. via a web browser and logging into the Cisco PAM Server Administration web page
B. by using the Cisco PAM Java Client
C. Cisco PAM is configured using Cisco VSOM
D. by using the Cisco PAM EDI Studio application
Answer: B
Q3. What is the default transport port that needs to be opened for communications between the Cisco Access Gateway and Cisco PAM?
A. Port 8080
B. Port 8082
C. Port 88
D. Port 8020
Answer: D
Q4. A gateway needs to have two doors connected to it. Each door has a reader, a maglock, a REX, and a contact closure. Can these doors be connected to a single gateway?
A. No, they will need an additional reader or input module.
B. No, a gateway cannot have two locks associated with it.
C. Yes, the gateway has enough power to power both readers and both locks.
D. Yes, but you will need to reassign the tamper or power fail inputs to accommodate the fourth input.
Answer: D
Q5. Which devices does Cisco manufacture and sell?
A. readers, locks, and door position switches
B. locks, doors, and door hardware
C. cards, card printers, and readers
D. Cisco does not manufacture or sell readers, locks, door hardware, or card printers
Answer: D
Q6. In Cisco PAM, which of the following can trigger an automation rule?
A. every event that shows in the event monitor
B. all alarms
C. external URL trigger
D. any event that shows in the event monitor, all alarms, or external URL trigger
Answer: D
Q7. When a 24 VDC fail safe lock is being used to secure a door, how should power be supplied to the lock from the control source?
A. connected +24 VDC directly to the lock
B. connected +24 VDC through common and normally close
C. connected +24 VDC through common and normally open
D. connected +5 VDC binary control signaling
Answer: B
Q8. You need to design a 31-door, networked Cisco Physical Access Control Gateway system. Each door will be controlled by a Cisco Access Gateway, and each Cisco Access Gateway will require its own IP address. Due to the limited number of available IP addresses, the network admin has decided to implement variable-length subnet mask (VLSM) in order to better allocate the available address space. What is the most efficient subnet mask that can be used to handle the 31 IP addresses that are needed for the Cisco Access Gateways?
A. 255.255.255.128: /25
B. 255.255.255.192: /26
C. 255.255.255.224: /27
D. 255.255.255.240: /28
Answer: B
Q9. On a converged network infrastructure, which Layer 2 technology can be easily enabled and configured to ensure separation of Cisco Physical Access Control Gateway traffic on the network from other "normal" data traffic (for example, IP voice, e-mails, and web browsing)?
A. IP routing
B. firewalls
C. QoS
D. VLAN
Answer: D