Cisco (300-915-DEVIOT) Exam Questions And Answers page 6
After an application is deployed, potential issues arise around connectivity. As part of the troubleshooting process, the IP address must be determined to ensure end-to-end communication.
Which method provides the required details using the Cisco IOx CLI?
Which method provides the required details using the Cisco IOx CLI?
ioxclient application metrics
ioxclient application getconfig
ioxclient application info
IoT Networking and Protocols
IoT Edge Computing
Refer to the exhibit. The code and the error message that are received when the code is run is presented.
What causes issues authenticating with Cisco GMM API using the web-generated API key?
firewall that blocks authentication ports
incorrect username and password
incorrect GMM Cluster selection
incorrect key size and data encryption
IoT Networking and Protocols
IoT Security and Privacy
Which two states are applications expected to be seen in when they are managed on Cisco IOx? (Choose two.)
DEACTIVATED
ACTIVATED
ALLOWED
STOPPED
VALIDATED
IoT Edge Computing
IoT Application Development
As part of an IoT project, an organization is developing an application that will share multiple clients using a REST API.
Based on the software development process, what are two valid technical activities that can be suggested to secure the REST API that is developed during the development of the software? (Choose two.)
Based on the software development process, what are two valid technical activities that can be suggested to secure the REST API that is developed during the development of the software? (Choose two.)
Respond to request failures in detail to allow users for easier troubleshooting.
Implement HTTP whitelisting to only methods that are allowed.
Implement and review audit logs for security-related events.
Reject HTTP methods that are invalid with an error code 404.
Implement physical firewalling and access control to the resources.
IoT Networking and Protocols
IoT Security and Privacy
Which data visualization technique should be used to represent an important single metric on a dashboard?
heatmap
scatter pot
gauge
treemap
IoT Data Processing and Analytics
IoT Application Development
Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)
The provisioning of digital identities is the responsibility of the data originators.
Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud-representation for data originators to be managed.
Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.
There is no need to provision and manage access for data originators in the cloud.
The access to public clouds must be configured and managed manually.
IoT Edge Computing
IoT Security and Privacy
Which two security approaches help build a strong authentication scheme? (Choose two.)
connection based on location
session IDs accepted only from cookies
maximum allowed connections
user logout
session logout because of inactivity
IoT Edge Computing
IoT Security and Privacy
An IoT application has been built into the application CI/CD pipeline. The application needs credentials to access other applications, APIs, and cloud resources.
When should the credentials be inserted into the application using the CI/CD process?
When should the credentials be inserted into the application using the CI/CD process?
hard coded into your application code base
during application runtime
after application testing
during application build time
IoT Edge Computing
IoT Security and Privacy
A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data has been gathered and normalized on the edge data software?
relational database: MySQL
historian database: influxDB
message broker: Apache Kafka
dashboard: Node.js web app
IoT Edge Computing
IoT Data Processing and Analytics
Which action should be taken when a southbound device is not connecting?
Verify the gateway link status.
Review the edge application logs.
Verify the sensor status.
Redeploy the edge application.
IoT Networking and Protocols
IoT Edge Computing
Comments