Exam Logo

Cisco (300-915-DEVIOT) Exam Questions And Answers page 6

After an application is deployed, potential issues arise around connectivity. As part of the troubleshooting process, the IP address must be determined to ensure end-to-end communication.

Which method provides the required details using the Cisco IOx CLI?
IoT Networking and Protocols IoT Edge Computing

Refer to the exhibit. The code and the error message that are received when the code is run is presented.

What causes issues authenticating with Cisco GMM API using the web-generated API key?
IoT Networking and Protocols IoT Security and Privacy
Which two states are applications expected to be seen in when they are managed on Cisco IOx? (Choose two.)
IoT Edge Computing IoT Application Development
As part of an IoT project, an organization is developing an application that will share multiple clients using a REST API.

Based on the software development process, what are two valid technical activities that can be suggested to secure the REST API that is developed during the development of the software? (Choose two.)
IoT Networking and Protocols IoT Security and Privacy
Which data visualization technique should be used to represent an important single metric on a dashboard?
IoT Data Processing and Analytics IoT Application Development
Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)
IoT Edge Computing IoT Security and Privacy
Which two security approaches help build a strong authentication scheme? (Choose two.)
IoT Edge Computing IoT Security and Privacy
An IoT application has been built into the application CI/CD pipeline. The application needs credentials to access other applications, APIs, and cloud resources.

When should the credentials be inserted into the application using the CI/CD process?
IoT Edge Computing IoT Security and Privacy
A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data has been gathered and normalized on the edge data software?
IoT Edge Computing IoT Data Processing and Analytics
Which action should be taken when a southbound device is not connecting?
IoT Networking and Protocols IoT Edge Computing