Exam Logo

Cisco (300-915-DEVIOT) Exam Questions And Answers page 3

Drag and drop the Dockerfile instructions from the left onto the correct arguments on the right.

IoT Edge Computing IoT Application Development

Refer to the exhibit. Which line of code completes the Dockerfile?
IoT Edge Computing IoT Application Development
A network is being configured for an Ethernet-connected sensor. The sensor fails to send data to the configured destination. The IP address of the sensor can be pinged from a laptop on the same subnet. When a different subnet is used, the sensor cannot be reached, but other clients on the same subnet are still accessible.

What are two reasons for the connectivity problem? (Choose two.)
IoT Networking and Protocols IoT Security and Privacy
Which two data sources are used with a visualization tool such as Grafana? (Choose two.)
IoT Data Processing and Analytics IoT Application Development

Refer to the exhibit. Which product must be positioned where the ? is placed to connect these different network levels?
IoT Networking and Protocols IoT Edge Computing
The environment for an Industrial IoT project in a large open pit mine is being scoped. The location has a large amount of dust and the device will be exposed to less than 1 meter of water temporarily.

When the edge device is being chosen, which Ingress protection rating must be used?
IoT Edge Computing IoT Security and Privacy
Which statement explains the correct position of a PLC within the CPwE architecture?
IoT Architecture and Design IoT Edge Computing
An engineering team developed a solution that gathers data via a proprietary protocol (TCP/IP based) to a IR1101 gateway, which then sends the data to the cloud. Drag and drop the action steps from the left into the correct order on the right to get this solution to operate. Not all options are used.

IoT Networking and Protocols IoT Edge Computing
Which lightweight protocol is used to send data from the edge compute resources to the cloud?
IoT Networking and Protocols IoT Edge Computing
A sensor reads potentially critical data from an industrial device, but most of the data from the sensor is not critical information and does not change unless a critical event happens.

Which data work flow is appropriate for how the critical and non-critical data is processed?
IoT Edge Computing IoT Data Processing and Analytics