Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are the four main components of a typical logical door?

A.

door, door knob, door jam, and hinges

B.

lock, reader, tailgate sensor, and motion detector

C.

lock, request to exit, door position switch, and swing arm

D.

lock, reader, request to exit, and door position switch

What are the three common methods that are used for authentication with an access control system?

A.

badge card, key fob, and keypad PIN

B.

badge card, keypad PIN, and password

C.

something you know, something you have, and something you are

D.

something you know, something you have, and something you did

When a 24 VDC fail safe lock is being used to secure a door, how should power be supplied to the lock from the control source?

A.

connected +24 VDC directly to the lock

B.

connected +24 VDC through common and normally close

C.

connected +24 VDC through common and normally open

D.

connected +5 VDC binary control signaling

In Cisco PAM 1.3.2, what is the maximum size of a database backup file?

A.

100 MB

B.

1 GB

C.

2 GB

D.

4 GB

E.

the backup file is limited only by available hard drive space

In Cisco PAM, how do you configure items such as DNS, system upgrades, and rebooting of the server?

A.

via a web browser and logging into the Cisco PAM Server Administration web page

B.

by using the Cisco PAM Java Client

C.

Cisco PAM is configured using Cisco VSOM

D.

by using the Cisco PAM EDI Studio application

Which one of the following image formats cannot be used as a background image in the graphical map editor in Cisco PAM?

A.

JPG (.jpg)

B.

SVG (.svg)

C.

BMP (.bmp)

D.

GIF (.gif)

Which of the following capabilities will cease to function if network connectivity is lost between the Cisco PAM Server and the Cisco Access Gateway?

A.

global I/O

B.

authenticating a valid badge that is presented to a reader that is connected to the Cisco Access Gateway

C.

caching events such as an REX request or a valid card read

D.

Global I/O, badge authentication, and caching of events will cease to function if network connectivity is lost between the Cisco PAM Server and Cisco Access Gateway

You need to design a 31-door, networked Cisco Physical Access Control Gateway system. Each door will be controlled by a Cisco Access Gateway, and each Cisco Access Gateway will require its own IP address. Due to the limited number of available IP addresses, the network admin has decided to implement variable-length subnet mask (VLSM) in order to better allocate the available address space. What is the most efficient subnet mask that can be used to handle the 31 IP addresses that are needed for the Cisco Access Gateways?

A.

255.255.255.128 : /25

B.

255.255.255.192 : /26

C.

255.255.255.224 : /27

D.

255.255.255.240 : /28

On a converged network infrastructure, which Layer 2 technology can be easily enabled and configured to ensure separation of Cisco Physical Access Control Gateway traffic on the network from other "normal" data traffic (for example, IP voice, e-mails, and web browsing)?

A.

IP routing

B.

firewalls

C.

QoS

D.

VLAN