Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) Questions and Answers

Questions 4

Refer to the exhibit.

300-915 Question 4

While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?

Options:

A.

paas

B.

docker-vm

C.

docker

D.

docker-app

Buy Now
Questions 5

Refer to the exhibit.

300-915 Question 5

The red line represents the energy consumption of an industrial machine. Which two statements about the graphs are true? (Choose two.)

Options:

A.

The orange graph is expected to drop to zero for a brief period around the midpoint on the x axis.

B.

The red graph contains the raw data points.

C.

The green graph is the mean value of the data points.

D.

The green graph does not give us any valuable information.

E.

The orange graph has three values on the y-axis.

Buy Now
Questions 6

A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data has been gathered and normalized on the edge data software?

Options:

A.

relational database: MySQL

B.

historian database: influxDB

C.

message broker: Apache Kafka

D.

dashboard: Node.js web app

Buy Now
Questions 7

What is a major difference of MQTT in terms of design compared to AMQP?

Options:

A.

MQTT requires more bandwidth.

B.

MQTT has very low overhead.

C.

MQTT has more advanced routing features for messages.

D.

MQTT provides routing based on headers.

Buy Now
Questions 8

As part of an IoT project, an organization is developing an application that will share multiple clients using a REST API.

Based on the software development process, what are two valid technical activities that can be suggested to secure the REST API that is developed during the development of the software? (Choose two.)

Options:

A.

Respond to request failures in detail to allow users for easier troubleshooting.

B.

Implement HTTP whitelisting to only methods that are allowed.

C.

Implement and review audit logs for security-related events.

D.

Reject HTTP methods that are invalid with an error code 404.

E.

Implement physical firewalling and access control to the resources.

Buy Now
Questions 9

An application needs to calculate if the product meets a determined quality specification, activate an automation to remove poor quality products, and report detailed results back to the cloud. All data are captured from an application that is connected to a sensor. Using the SDK of the cloud provider, drag and drop the tasks that must be completed from the left to the right. Not all options are used.

300-915 Question 9

Options:

Buy Now
Questions 10

Refer to the exhibit.

300-915 Question 10

Which two statements about MQTT messaging are true? (Choose two.)

Options:

A.

Result code 5 means the connection is accepted; result code 0 means the connection is " refused, not authorized " .

B.

Redundant ClientIDs are supported by MQTT brokers.

C.

MQTT does not support a " keep alive " functionality because it runs on top of TCP.

D.

Result code 0 means the connection is accepted; result code 5 means the connection is " refused, not authorized " .

E.

Brokers can send the Last Will and Testament messages on behalf of the client.

Buy Now
Questions 11

Which data visualization technique should be used to represent an important single metric on a dashboard?

Options:

A.

heatmap

B.

scatter pot

C.

gauge

D.

treemap

Buy Now
Questions 12

Which method defines the integration of Cisco Industrial Network Director with the Cisco identity Service Engine?

Options:

A.

Cisco IND integrates with ISE via Cisco Strealthwatch services.

B.

Cisco IND integrates with ISE using RADIUS services.

C.

Cisco IND is registered with pxGrid on ISE as a publisher.

D.

Cisco IND pulls the profiling information from ISE.

Buy Now
Questions 13

Refer to the exhibit.

300-915 Question 13

Which protocol is used to make a FlexVPN connection from a Cisco IR829 router to a headend router?

Options:

A.

SSL

B.

IKEv2

C.

NAT

D.

IS-IS

Buy Now
Questions 14

Mosquitto was installed correctly on the Cisco IR829 router as a Cisco IOx application. When the sensor is connected to the broker on the Cisco IR829 router with the default port, the connection is refused (Error Code 5).

Which action should be done to resolve the issue?

Options:

A.

Insert in the IOS config: ip nat inside source static tcp < CAF IP > 1883 interface GigabitEthernet0 1883

B.

Insert in the package_config.ini file under section ports: tcp: [ " 8883 " ]

C.

Use the correct username and password.

D.

Insert in the package.yaml file under section ports: tcp: [ " 1883 " ]

Buy Now
Questions 15

Which two data sources are used with a visualization tool such as Grafana? (Choose two.)

Options:

A.

Microsoft Power BI

B.

Kibana

C.

InfluxDB

D.

Elasticsearch

E.

Tableau

Buy Now
Questions 16

An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets.

Which method helps to get this implementation accurate from a security point of view?

Options:

A.

Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.

B.

Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets.

Machines can be trusted, and they can be issued with static credentials.

C.

Maintain a different service associated to secret systems to issue access.

D.

After a user is authenticated by any trusted system, the user can be trusted to use any service.

Buy Now
Questions 17

Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)

Options:

A.

The provisioning of digital identities is the responsibility of the data originators.

B.

Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud- representation for data originators to be managed.

C.

Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.

D.

There is no need to provision and manage access for data originators in the cloud.

E.

The access to public clouds must be configured and managed manually.

Buy Now
Questions 18

When an RS232 device is connected to a Cisco IR829 router, the data collected is not being parsed correctly by the edge application.

Which two steps should be taken to troubleshoot the issue? (Choose two.)

Options:

A.

SSH access on the Cisco IR829 router must be enabled for IOx Guest OS.

B.

Communication mode must be set to half duplex over serial connection.

C.

Serial cable length should not exceed 1.5 meters.

D.

Ensure that communication parameters like baud rate and parity are set correctly.

E.

Set the cable connections based on the PIN layout from the sensor vendor.

Buy Now
Exam Code: 300-915
Exam Name: Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT)
Last Update: May 5, 2026
Questions: 60

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 300-915 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 300-915 pdf