Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 300-915 Dumps

Page: 1 / 2
Total 60 questions

Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) Questions and Answers

Question 1

When trying to subscribe to an MQTT broker on the internet, the MQTT client is on a private subnet and must be NATed to reach the public broker.

What is the expected outcome when this configuration is in place?

Options:

A.

The client periodically reconnects to the default gateway.

B.

The client connects only once using the PENDING message to the broker.

C.

The client periodically reconnects to the broker over the NAT connection.

D.

The client connects only once using the CONNECT massage to the broker.

Question 2

What is a major difference of MQTT in terms of design compared to AMQP?

Options:

A.

MQTT requires more bandwidth.

B.

MQTT has very low overhead.

C.

MQTT has more advanced routing features for messages.

D.

MQTT provides routing based on headers.

Question 3

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets.

Which method helps to get this implementation accurate from a security point of view?

Options:

A.

Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.

B.

Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets.

Machines can be trusted, and they can be issued with static credentials.

C.

Maintain a different service associated to secret systems to issue access.

D.

After a user is authenticated by any trusted system, the user can be trusted to use any service.

Question 4

Mosquitto was installed correctly on the Cisco IR829 router as a Cisco IOx application. When the sensor is connected to the broker on the Cisco IR829 router with the default port, the connection is refused (Error Code 5).

Which action should be done to resolve the issue?

Options:

A.

Insert in the IOS config: ip nat inside source static tcp 1883 interface GigabitEthernet0 1883

B.

Insert in the package_config.ini file under section ports: tcp: ["8883"]

C.

Use the correct username and password.

D.

Insert in the package.yaml file under section ports: tcp: ["1883"]

Question 5

Which two security approaches help build a strong authentication scheme? (Choose two.)

Options:

A.

connection based on location

B.

session IDs accepted only from cookies

C.

maximum allowed connections

D.

user logout

E.

session logout because of inactivity

Question 6

Refer to the exhibit.

A new application has just been developed as a Docker container. What is the missing step for packaging the container ready for deployment in IOx?

Options:

A.

Pull/push the image to the Docker registry.

B.

Build the package.yaml files.

C.

Build the package.cert file to sign the app.

D.

Log in to device manager and load the application.

Question 7

Which data visualization technique should be used to represent an important single metric on a dashboard?

Options:

A.

heatmap

B.

scatter pot

C.

gauge

D.

treemap

Question 8

Which element ensures that PKI is used to establish the identity of IoT devices?

Options:

A.

unique device identifier

B.

encryption key

C.

air gap

D.

hashed routes

Question 9

Which statement explains the correct position of a PLC within the CPwE architecture?

Options:

A.

PLCs are always part of Level 0 – process control.

B.

PLCs are part of Level 4 – site business planning.

C.

PLCs are part of Level 1 – basic control.

D.

PLCs are placed at Level 2 – area supervisory control.

Page: 1 / 2
Total 60 questions