Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

648-247 Cisco Implementing Cisco Connected Physical Security 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 648-247 Implementing Cisco Connected Physical Security 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 52 questions

Your customer would like to deploy Cisco PAM in a highly-available, redundant system configuration. Cisco PAM Server A will be the primary server, and Server B is the secondary, backup server. Which of the following network configurations will accomplish this?

A) Server A (primary) Server B (secondary)

B) Server A (primary) Server B (secondary)

 

C) Server A (primary) Server B (secondary)

 

D) Server A (primary) Server B (secondary)

 

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is the default schedule to specify how often EDI data will be synchronized with the Cisco PAM, and can it be customized?

A.

The default schedule is every 60 minutes and customizable.

B.

The default schedule is every 60 minutes and not customizable.

C.

The default schedule is every 120 seconds and customizable.

D.

The default schedule is every 120 seconds and not customizable.

A deployment uses the same template for 100 doors. Five of these doors have an extra sensor and use supervised inputs instead of unsupervised inputs. In the near future, these doors will be replaced and will follow the same template as the other 95 doors. Which of the following is the best method to configure these 5 doors?

A.

Create a new door template for these 5 doors. When the doors are replaced, delete the door template and reconfigure the door.

B.

Use the same template for all 100 doors. When the door is replaced, it will already be configured with the correct template.

C.

Use the same template for all 100 doors. Add the extra sensor to the door manually and override the template's settings for supervised and unsupervised input. When the door is replaced, remove the extra device and set the input back to default.

D.

Create a new door template for these 5 doors. When the doors are replaced, be sure to use a supervised door position switch and terminate the spare sensor leads.

You just received a new Cisco PAM appliance from Cisco. After unpacking the new server and plugging it into the network, how does the new Cisco PAM appliance get an IP address upon being powered on for the first time?

A.

Cisco PAM will request an IP address via DHCP.

B.

Cisco PAM will first request an IP address via DHCP. If Cisco PAM does not receive a DHCP response, it will assign itself an IP address of 192.168.1.2.

C.

Cisco PAM is statically configured with an IP address of 10.1.1.2.

D.

Cisco PAM is statically configured with an IP address of 192.168.1.2.

How can Cisco Physical Access Control (Cisco PAC) modules directly interface with fire alarm systems for door release function?

A.

Cisco PAC modules should not directly interface with firm alarm systems for door release functions.

B.

Cisco PAC modules can directly interface with fire alarm systems for door release functions via the CAN bus.

C.

Cisco PAC modules can directly interface with fire alarm systems for door release functions via open APIs in the Cisco PAM.

D.

Cisco PAC modules cannot directly interface with fire alarm systems for door release functions because the modules are digital and fire alarm systems are analog.

In the event of a loss in network connectivity, what is the maximum number of credentials and events that can be cached on board the Cisco Physical Access Control Gateway module?

A.

25,000 credentials and 10,000 events

B.

25,000 credentials and 15,000 events

C.

250,000 credentials and 100,000 events

D.

250,000 credentials and 150,000 events

Cisco Physical Access Control Gateways and Reader Modules are compatible with which of the following Reader Types?

A.

proximity readers only

B.

Cisco Readers only

C.

any Wiegand Compatible Reader

D.

any card reader

Which of the following statements are true? 1. Eth1 has an IP address of 192.168.1.42, and it cannot be changed.2. The Cisco Access Gateway can only store one firmware version at a time.3. Two readers can be connected to a single Cisco Access Gateway.4. Gateway inputs and outputs can be configured directly on the gateway, without the use of the Cisco Physical Access Manager software.  

A.

All of the statements are true.

B.

Only Statements 1 and 3 are true.

C.

Only Statements 2 and 4 are true.

D.

Statements 2, 3, and 4 are true.

How should NTP be implemented in a Cisco Physical Access Control Gateway design?

A.

NTP is not required.

B.

NTP should be configured for the Cisco PAM Server only.

C.

NTP should be configured for Cisco Physical Access Control Gateways only.

D.

NTP should be configured on Cisco PAM Servers and gateways.

You need to design a 31-door, networked Cisco Physical Access Control Gateway system. Each door will be controlled by a Cisco Access Gateway, and each Cisco Access Gateway will require its own IP address. Due to the limited number of available IP addresses, the network admin has decided to implement variable-length subnet mask (VLSM) in order to better allocate the available address space. What is the most efficient subnet mask that can be used to handle the 31 IP addresses that are needed for the Cisco Access Gateways?

A.

255.255.255.128 : /25

B.

255.255.255.192 : /26

C.

255.255.255.224 : /27

D.

255.255.255.240 : /28

On a converged network infrastructure, which Layer 2 technology can be easily enabled and configured to ensure separation of Cisco Physical Access Control Gateway traffic on the network from other "normal" data traffic (for example, IP voice, e-mails, and web browsing)?

A.

IP routing

B.

firewalls

C.

QoS

D.

VLAN

Refer to the exhibit.

One or more expansion modules is connected to the Cisco Access Gateway via a CAN bus. How should the CAN bus wires be connected after the last module in the chain?

A.

The CAN bus wires should be looped back to the Cisco Access Gateway.

B.

The CAN bus wires should be twisted together and tucked away.

C.

The CAN bus wires should be plugged into a Layer 2 Ethernet switch.

D.

The CAN bus wires should be terminated with a high-impedance resistor.

Page: 1 / 1
Total 52 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved