Certbus > Cisco > Cisco Certified DevNet Professional > 300-915 > 300-915 Online Practice Questions and Answers

300-915 Online Practice Questions and Answers

Questions 4

DRAG DROP

An engineering team developed a solution that gathers data via a proprietary protocol (TCP/IP based) to a IR1101 gateway, which then sends the data to the cloud. Drag and drop the action steps from the left into the correct order on the right to get this solution to operate. Not all options are used.

Select and Place:

Browse 59 Q&As
Questions 5

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets.

Which method helps to get this implementation accurate from a security point of view?

A. Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.

B. Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets. Machines can be trusted, and they can be issued with static credentials.

C. Maintain a different service associated to secret systems to issue access.

D. After a user is authenticated by any trusted system, the user can be trusted to use any service.

Browse 59 Q&As
Questions 6

Refer to the exhibit. When a Docker image is built using this Dockerfile, which two statements are valid on Cisco IOx 1.8 and before? (Choose two.)

A. It builds an image that can be executed on all Cisco platforms.

B. It builds a Docker image that cannot be used directly on Cisco IOx.

C. It compiles a "hello world" program in C.

D. It creates two separate images.

E. It builds an IOx package that can be deployed directly.

Browse 59 Q&As
Questions 7

Refer to the exhibit. Which two statements about MQTT messaging are true? (Choose two.)

A. Result code 5 means the connection is accepted; result code 0 means the connection is "refused, not authorized".

B. Redundant ClientIDs are supported by MQTT brokers.

C. MQTT does not support a "keep alive" functionality because it runs on top of TCP.

D. Result code 0 means the connection is accepted; result code 5 means the connection is "refused, not authorized".

E. Brokers can send the Last Will and Testament messages on behalf of the client.

Browse 59 Q&As
Questions 8

How does the Cisco router (IR) and switch (IE) portfolio support edge data services?

A. Edge data services can be run and managed as containers using Cisco IOx.

B. Edge data services can run only in virtual machines on a separate compute layer.

C. Edge data services are aliases for IR/IE configuration services.

D. Edge data services run as separate instances only on virtual machines.

Browse 59 Q&As
Questions 9

Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?

A. paas

B. docker-vm

C. docker

D. docker-app

Browse 59 Q&As
Questions 10

An IoT application has been built into the application CI/CD pipeline. The application needs credentials to access other applications, APIs, and cloud resources.

When should the credentials be inserted into the application using the CI/CD process?

A. hard coded into your application code base

B. during application runtime

C. after application testing

D. during application build time

Browse 59 Q&As
Questions 11

Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)

A. The provisioning of digital identities is the responsibility of the data originators.

B. Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud-representation for data originators to be managed.

C. Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.

D. There is no need to provision and manage access for data originators in the cloud.

E. The access to public clouds must be configured and managed manually.

Browse 59 Q&As
Questions 12

Which two data sources are used with a visualization tool such as Grafana? (Choose two.)

A. Microsoft Power BI

B. Kibana

C. InfluxDB

D. Elasticsearch

E. Tableau

Browse 59 Q&As
Questions 13

Refer to the exhibit. The code snippet provides information about the packet captures within a network.

How can the most used source IP addresses within a specific time be visualized?

A. line graph

B. bar histogram

C. scatter plot

D. heatmap

Browse 59 Q&As
Questions 14

What are two functionalities of edge data services? (Choose two.)

A. creating a machine learning data model

B. supporting many interfaces and APIs

C. applying advanced data analytics

D. filtering, normalizing and aggregating data

E. saving data for a prolonged time period

Browse 59 Q&As
Questions 15

Refer to the exhibit. The red line represents the energy consumption of an industrial machine.

Which two statements about the graphs are true? (Choose two.)

A. The orange graph is expected to drop to zero for a brief period around the midpoint on the x axis.

B. The red graph contains the raw data points.

C. The green graph is the mean value of the data points.

D. The green graph does not give us any valuable information.

E. The orange graph has three values on the y-axis.

Browse 59 Q&As
Questions 16

Refer to the exhibit. The code and the error message that are received when the code is run is presented.

What causes issues authenticating with Cisco GMM API using the web-generated API key?

A. firewall that blocks authentication ports

B. incorrect username and password

C. incorrect GMM Cluster selection

D. incorrect key size and data encryption

Browse 59 Q&As
Questions 17

As part of an IoT project, an organization is developing an edge application that will run on a gateway to securely transmit sensor information it receives into an IoT cloud. Based on the Agile software development lifecycle, the development team is planning to implement a CI/CD pipeline.

Which two methods should be suggested to make the software development lifecycle more secure during the implementation and testing? (Choose two.)

A. Perform automated code reviews prior to deployment.

B. Implement auto-provisioning security inspection for the code.

C. Perform on-going penetration testing on the system.

D. Perform a GAP analysis on current security activities and policies.

E. Train members of the team in a secure software development lifecycle methodology such as OWASP.

Browse 59 Q&As
Questions 18

Which command is used to package a Docker-style Cisco IOx app using ioxclient?

A. ioxclient docker create helloworld:1.0.

B. ioxclient docker-app helloworld:1.0.

C. ioxclient docker package helloworld:1.0.

D. ioxclient docker helloworld:1.0.

Browse 59 Q&As
Exam Code: 300-915
Exam Name: Developing Solutions using Cisco IoT and Edge Platforms (DEVIOT)
Last Update: May 03, 2024
Questions: 59 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99