Exam Logo

Cisco (300-915-DEVIOT) Exam Questions And Answers page 4

A customer is deploying sensors with Cisco IR829 routers in moving trucks to continuously monitor the health of engines using a cloud application.

Which data extraction and processing strategy is best suited in this environment?
IoT Networking and Protocols IoT Data Processing and Analytics

Refer to the exhibit. Which two statements about data flow are true? (Choose two.)
IoT Networking and Protocols IoT Data Processing and Analytics
Where are edge data services typically instantiated?
IoT Edge Computing IoT Data Processing and Analytics
What are two functionalities of edge data services? (Choose two.)
IoT Edge Computing IoT Data Processing and Analytics
When constructing a Python script for data extraction using GMM APIs on a Cisco Kinetic Cloud platform, how should the API authentication be implemented?
IoT Networking and Protocols IoT Application Development

Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?
IoT Edge Computing IoT Application Development

Refer to the exhibit. The graph has been provided by the monitoring team to the IoT Engineer. The red line represents the consumption of energy from an industrial machine.

Which two pieces of information can be captured? (Choose two.)
IoT Architecture and Design IoT Data Processing and Analytics

Refer to the exhibit. Based on the MQTT client output, which action should be taken so that the connection to the broker can be established?
IoT Networking and Protocols IoT Security and Privacy
As part of an IoT project, an organization is developing an edge application that will run on a gateway to securely transmit sensor information it receives into an IoT cloud. Based on the Agile software development lifecycle, the development team is planning to implement a CI/CD pipeline.

Which two methods should be suggested to make the software development lifecycle more secure during the implementation and testing? (Choose two.)
IoT Edge Computing IoT Security and Privacy

Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?
IoT Edge Computing IoT Application Development