cisco 300-915 practice test

Developing Solutions using Cisco IoT and Edge Platforms (DEVIOT)

Question 1

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services
like database or compute on AWS. The engineer decides to implement dynamic secrets.
Which method helps to get this implementation accurate from a security point of view?

  • A. Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.
  • B. Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets. Machines can be trusted, and they can be issued with static credentials.
  • C. Maintain a different service associated to secret systems to issue access.
  • D. After a user is authenticated by any trusted system, the user can be trusted to use any service.



Question 2

A network is being configured for an Ethernet-connected sensor. The sensor fails to send data to the configured destination.
The IP address of the sensor can be pinged from a laptop on the same subnet. When a different subnet is used, the sensor
cannot be reached, but other clients on the same subnet are still accessible.
What are two reasons for the connectivity problem? (Choose two.)

  • A. wrong DNS server on the sensor
  • B. wrong subnet mask on your laptop
  • C. wrong default gateway on the sensor
  • D. wrong default gateway on your laptop
  • E. wrong subnet mask on the sensor



Question 3

How does the Cisco router (IR) and switch (IE) portfolio support edge data services?

  • A. Edge data services can be run and managed as containers using Cisco IOx.
  • B. Edge data services can run only in virtual machines on a separate compute layer.
  • C. Edge data services are aliases for IR/IE configuration services.
  • D. Edge data services run as separate instances only on virtual machines.



Question 4

Refer to the exhibit. The code and the error message that are received when the code is run is presented.
What causes issues authenticating with Cisco GMM API using the web-generated API key?

  • A. firewall that blocks authentication ports
  • B. incorrect username and password
  • C. incorrect GMM Cluster selection
  • D. incorrect key size and data encryption



Question 5

Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)

  • A. The provisioning of digital identities is the responsibility of the data originators.
  • B. Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud-representation for data originators to be managed.
  • C. Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.
  • D. There is no need to provision and manage access for data originators in the cloud.
  • E. The access to public clouds must be configured and managed manually.



Question 6

An engineering team developed a solution that gathers data via a proprietary protocol (TCP/IP based) to a IR1101 gateway,
which then sends the data to the cloud. Drag and drop the action steps from the left into the correct order on the right to get
this solution to operate. Not all options are used.
Select and Place:



Question 7

Which action should be taken when a southbound device is not connecting?

  • A. Verify the gateway link status.
  • B. Review the edge application logs.
  • C. Verify the sensor status.
  • D. Redeploy the edge application.



Question 8

Refer to the exhibit. Which two statements about data flow are true? (Choose two.)

  • A. Another AMQP broker should be implemented on the customer cloud.
  • B. Instead of AMQP, MQTT should be used for compatibility issues in a cloud-to-cloud connection.
  • C. A VPN tunnel is not necessary because the MQTT payload is encrypted by default.
  • D. The gateway must stay constantly connected to the Kinetic cloud to avoid blank data sets, even when using caching functions.
  • E. The Python application could use the paho-mqtt library.



Question 9

Refer to the exhibit. When a Docker image is built using this Dockerfile, which two statements are valid on Cisco IOx 1.8 and
before? (Choose two.)

  • A. It builds an image that can be executed on all Cisco platforms.
  • B. It builds a Docker image that cannot be used directly on Cisco IOx.
  • C. It compiles a "hello world" program in C.
  • D. It creates two separate images.
  • E. It builds an IOx package that can be deployed directly.



Question 10

Which two actions must be completed before starting the process of sending IoT data to the cloud via edge routers?
(Choose two.)

  • A. Measure the voltage, power rating, and quiescent current for the sensors that send data to the cloud.
  • B. Gather the hardware (MAC) addresses of local and cloud routers to ensure low latency communication.
  • C. Collect information about the CPU architecture in the cloud and edge to ensure that they match.
  • D. Gather the interval, the volume, and the latency that the data must be provisioned with.
  • E. Collect information about growth, required elasticity, and high availability of the provisioning process.


To page 2