What are the three common methods that are used for authentication with an access control system?
When a 24 VDC fail safe lock is being used to secure a door, how should power be supplied to the lock from the control source?
Refer to the exhibit.
One or more expansion modules is connected to the Cisco Access Gateway via a CAN bus. How should the CAN bus wires be connected after the last module in the chain?
On a converged network infrastructure, which Layer 2 technology can be easily enabled and configured to ensure separation of Cisco Physical Access Control Gateway traffic on the network from other "normal" data traffic (for example, IP voice, e-mails, and web browsing)?
You need to design a 31-door, networked Cisco Physical Access Control Gateway system. Each door will be controlled by a Cisco Access Gateway, and each Cisco Access Gateway will require its own IP address. Due to the limited number of available IP addresses, the network admin has decided to implement variable-length subnet mask (VLSM) in order to better allocate the available address space. What is the most efficient subnet mask that can be used to handle the 31 IP addresses that are needed for the Cisco Access Gateways?
A Cisco Access Gateway is not getting autodiscovered by the Cisco PAM Server. Which two of the following actions are not possible resolutions for this issue? (Choose two.)
A gateway needs to have two doors connected to it. Each door has a reader, a maglock, a REX, and a contact closure. Can these doors be connected to a single gateway?
How should NTP be implemented in a Cisco Physical Access Control Gateway design?