Cisco 300-915 DEVIOT Exam Questions

Cisco 300-915 DEVIOT Exam Questions

The questions provided below are part of our premium content and are very useful for both practicing for the CCNA 200-301 Real Exam and getting an idea on how the premium content looks like.

We do out best to provide our users with as much content as possible and appreciate your support by using our products.

Please use the comment section to leave your thoughts and suggestions.

DEVIOT 300-915 PREMIUM QUESTIONS

50.00

PDF&VCE with 71 Questions and Answers
VCE Simulator Included
30 Days Free Updates | 24×7 Support | Verified by Experts

QUESTION 1

A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data has been gathered and normalized on the edge data software?

A. relational database: MySQL
B. historian database: influxDB
C. message broker: Apache Kafka
D. dashboard: Node.js web app

QUESTION 2

Which data visualization technique should be used to represent an important single metric on a dashboard?

A. heatmap
B. scatter pot
C. gauge
D. treemap

QUESTION 3

When trying to subscribe to an MQTT broker on the internet, the MQTT client is on a private subnet and must be NATed to reach the public broker.
What is the expected outcome when this configuration is in place?

A. The client periodically reconnects to the default gateway.
B. The client connects only once using the PENDING message to the broker.
C. The client periodically reconnects to the broker over the NAT connection.
D. The client connects only once using the CONNECT massage to the broker.

QUESTION 4

Which two states are applications expected to be seen in when they are managed on Cisco IOx? (Choose two.)

A. DEACTIVATED
B. ACTIVATED
C. ALLOWED
D. STOPPED
E. VALIDATED

QUESTION 5

Which connector is southbound?

A. horizontal connector
B. cloud connector
C. device connector
D. universal connector

QUESTION 6

When constructing a Python script for data extraction using GMM APIs on a Cisco Kinetic Cloud platform, how should the API authentication be implemented?

A. Generate the API keys once and edit the permissions as needed.
B. Generate and use the API keys for the required access level from the Kinetic Cloud application.
C. Use a complex username and password with 128-bit encryption.
D. Use a complex username with an auto-generated password from the Kinetic Cloud application.

QUESTION 7

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS.

The engineer decides to implement dynamic secrets.
Which method helps to get this implementation accurate from a security point of view?

A. Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.
B. Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets.
Machines can be trusted, and they can be issued with static credentials.
C. Maintain a different service associated to secret systems to issue access.
D. After a user is authenticated by any trusted system, the user can be trusted to use any service.

QUESTION 8

Which statement explains the correct position of a PLC within the CPwE architecture?

A. PLCs are always part of Level 0 process control.
B. PLCs are part of Level 4 site business planning.
C. PLCs are part of Level 1 basic control.
D. PLCs are placed at Level 2 area supervisory control.

QUESTION 9
A sensor reads potentially critical data from an industrial device, but most of the data from the sensor is not critical information and does not change unless a
critical event happens.
Which data work flow is appropriate for how the critical and non-critical data is processed?

A.

  1. Acquire sensor data.
  2. Filter non-actionable data.
  3. Perform action on data.
  4. Send critical data and action performed on data to cloud for storing.

B.

  1. Acquire sensor data.
  2. Send data to cloud for processing and to determine action.
  3. Send required action back to edge for action completion.
  4. Perform action on data.

C.

  1. Acquire sensor data.
  2. Filter non-actionable data.
  3. Perform action on data.

D.

  1. Acquire sensor data.
  2. Perform action on data.
  3. Send data and action performed on data to cloud for recording.

QUESTION 10

Refer to the exhibit. When a Docker image is built using this Dockerfile, which two statements are valid on Cisco IOx 1.8 and before? (Choose two.)

A. It builds an image that can be executed on all Cisco platforms.
B. It builds a Docker image that cannot be used directly on Cisco IOx.
C. It compiles a “hello world” program in C.
D. It creates two separate images.
E. It builds an IOx package that can be deployed directly.

Leave Comment

Your email address will not be published.