Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 300-915 has been withdrawn.

300-915 Practice Exam Questions with Answers Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) Certification

Question # 6

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets.

Which method helps to get this implementation accurate from a security point of view?

A.

Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.

B.

Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets.

Machines can be trusted, and they can be issued with static credentials.

C.

Maintain a different service associated to secret systems to issue access.

D.

After a user is authenticated by any trusted system, the user can be trusted to use any service.

Full Access
Question # 7

When trying to subscribe to an MQTT broker on the internet, the MQTT client is on a private subnet and must be NATed to reach the public broker.

What is the expected outcome when this configuration is in place?

A.

The client periodically reconnects to the default gateway.

B.

The client connects only once using the PENDING message to the broker.

C.

The client periodically reconnects to the broker over the NAT connection.

D.

The client connects only once using the CONNECT massage to the broker.

Full Access
Question # 8

After an application is deployed, potential issues arise around connectivity. As part of the troubleshooting process, the IP address must be determined to ensure end-to-end communication.

Which method provides the required details using the Cisco IOx CLI?

A.

ioxclient application status

B.

ioxclient application metrics

C.

ioxclient application getconfig

D.

ioxclient application info

Full Access
Question # 9

Refer to the exhibit.

300-915 question answer

A new application has just been developed as a Docker container. What is the missing step for packaging the container ready for deployment in IOx?

A.

Pull/push the image to the Docker registry.

B.

Build the package.yaml files.

C.

Build the package.cert file to sign the app.

D.

Log in to device manager and load the application.

Full Access
Question # 10

As part of an IoT project, an organization is developing an application that will share multiple clients using a REST API.

Based on the software development process, what are two valid technical activities that can be suggested to secure the REST API that is developed during the development of the software? (Choose two.)

A.

Respond to request failures in detail to allow users for easier troubleshooting.

B.

Implement HTTP whitelisting to only methods that are allowed.

C.

Implement and review audit logs for security-related events.

D.

Reject HTTP methods that are invalid with an error code 404.

E.

Implement physical firewalling and access control to the resources.

Full Access
Question # 11

Refer to the exhibit.

300-915 question answer

The code snippet provides information about the packet captures within a network. How can the most used source IP addresses within a specific time be visualized?

A.

line graph

B.

bar histogram

C.

scatter plot

D.

heatmap

Full Access
Question # 12

Refer to the exhibit.

300-915 question answer

Which protocol is used to make a FlexVPN connection from a Cisco IR829 router to a headend router?

A.

SSL

B.

IKEv2

C.

NAT

D.

IS-IS

Full Access
Question # 13

An IOx application is installed via Local Manager. Every time the application is started, it instantly stops.

Which troubleshooting steps should be taken?

A.

There is something wrong with the application code itself.

B.

Check the startup and entrypoint parameters.

C.

Give the IOx application more CPU units.

D.

Check local IOx settings, especially the network settings.

Full Access
Question # 14

What are two functionalities of edge data services? (Choose two.)

A.

creating a machine learning data model

B.

supporting many interfaces and APIs

C.

applying advanced data analytics

D.

filtering, normalizing and aggregating data

E.

saving data for a prolonged time period

Full Access
Question # 15

Drag and drop the tasks from the left into the correct order on the right for transporting data from sensors to the cloud, in order to extract the machine data and use the cloud-based analytics for predictive maintenance.

300-915 question answer

Full Access
Question # 16

A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data has been gathered and normalized on the edge data software?

A.

relational database: MySQL

B.

historian database: influxDB

C.

message broker: Apache Kafka

D.

dashboard: Node.js web app

Full Access
Question # 17

Drag and drop the Dockerfile instructions from the left onto the correct arguments on the right.

300-915 question answer

Full Access
Question # 18

An engineering team developed a solution that gathers data via a proprietary protocol (TCP/IP based) to a IR1101 gateway, which then sends the data to the cloud. Drag and drop the action steps from the left into the correct order on the right to get this solution to operate. Not all options are used.

300-915 question answer

Full Access