Cisco (300-915-DEVIOT) Exam Questions And Answers page 4
A customer is deploying sensors with Cisco IR829 routers in moving trucks to continuously monitor the health of engines using a cloud application.
Which data extraction and processing strategy is best suited in this environment?
Which data extraction and processing strategy is best suited in this environment?
Generate local alerts and create reports at the edge, and upload to the cloud at the end of the day.
Use the store and forward mechanism to upload the information at the earliest to cloud.
Ensure that data is stored for a longer duration locally and upload to the cloud every week.
IoT Networking and Protocols
IoT Data Processing and Analytics
Refer to the exhibit. Which two statements about data flow are true? (Choose two.)
Another AMQP broker should be implemented on the customer cloud.
Instead of AMQP, MQTT should be used for compatibility issues in a cloud-to-cloud connection.
A VPN tunnel is not necessary because the MQTT payload is encrypted by default.
The gateway must stay constantly connected to the Kinetic cloud to avoid blank data sets, even when using caching functions.
The Python application could use the paho-mqtt library.
IoT Networking and Protocols
IoT Data Processing and Analytics
Where are edge data services typically instantiated?
at the edge of network
in the cloud
in the data center
in a private cloud
IoT Edge Computing
IoT Data Processing and Analytics
What are two functionalities of edge data services?
Multiple Choice
What are two functionalities of edge data services? (Choose two.)
creating a machine learning data model
supporting many interfaces and APIs
applying advanced data analytics
filtering, normalizing and aggregating data
saving data for a prolonged time period
IoT Edge Computing
IoT Data Processing and Analytics
When constructing a Python script for data extraction using GMM APIs on a Cisco Kinetic Cloud platform, how should the API authentication be implemented?
Generate the API keys once and edit the permissions as needed.
Generate and use the API keys for the required access level from the Kinetic Cloud application.
Use a complex username and password with 128-bit encryption.
Use a complex username with an auto-generated password from the Kinetic Cloud application.
IoT Networking and Protocols
IoT Application Development
Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?
paas
docker-vm
docker
docker-app
IoT Edge Computing
IoT Application Development
Refer to the exhibit. The graph has been provided by the monitoring team to the IoT Engineer. The red line represents the consumption of energy from an industrial machine.
Which two pieces of information can be captured? (Choose two.)
The green graph visualizes the mean value of the data points.
The green graph visualizes if the electronic device is not in stand-by mode.
The orange graph visualizes a boolean: power on/off.
The orange graph contains more information than the red graph.
IoT Architecture and Design
IoT Data Processing and Analytics
Refer to the exhibit. Based on the MQTT client output, which action should be taken so that the connection to the broker can be established?
Change the username/password.
Open port 1883 on the network firewall.
Change the IP address of the broker.
Add the certificate.
IoT Networking and Protocols
IoT Security and Privacy
As part of an IoT project, an organization is developing an edge application that will run on a gateway to securely transmit sensor information it receives into an IoT cloud. Based on the Agile software development lifecycle, the development team is planning to implement a CI/CD pipeline.
Which two methods should be suggested to make the software development lifecycle more secure during the implementation and testing? (Choose two.)
Which two methods should be suggested to make the software development lifecycle more secure during the implementation and testing? (Choose two.)
Perform automated code reviews prior to deployment.
Implement auto-provisioning security inspection for the code.
Perform on-going penetration testing on the system.
Perform a GAP analysis on current security activities and policies.
Train members of the team in a secure software development lifecycle methodology such as OWASP.
IoT Edge Computing
IoT Security and Privacy
Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?
paas
docker-vm
docker
docker-app
IoT Edge Computing
IoT Application Development
Comments