Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-915 Sample Questions Answers

Questions 4

A sensor reads potentially critical data from an industrial device, but most of the data from the sensor is not critical information and does not change unless a critical event happens.

Which data work flow is appropriate for how the critical and non-critical data is processed?

Options:

A.

1. Acquire sensor data.

2.Filter non-actionable data.

3.Perform action on data.

4.Send critical data and action performed on data to cloud for storing.

B.

1. Acquire sensor data.

2.Send data to cloud for processing and to determine action.

3.Send required action back to edge for action completion.

4.Perform action on data.

C.

1. Acquire sensor data.

2.Filter non-actionable data.

3.Perform action on data.

D.

1. Acquire sensor data.

2.Perform action on data.

3.Send data and action performed on data to cloud for recording.

Buy Now
Questions 5

Refer to the exhibit.

While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type must be added to the snippet to resolve the issue?

Options:

A.

paas

B.

docker-vm

C.

docker

D.

docker-app

Buy Now
Questions 6

Which method defines the integration of Cisco Industrial Network Director with the Cisco identity Service Engine?

Options:

A.

Cisco IND integrates with ISE via Cisco Strealthwatch services.

B.

Cisco IND integrates with ISE using RADIUS services.

C.

Cisco IND is registered with pxGrid on ISE as a publisher.

D.

Cisco IND pulls the profiling information from ISE.

Buy Now
Questions 7

What are two functionalities of edge data services? (Choose two.)

Options:

A.

creating a machine learning data model

B.

supporting many interfaces and APIs

C.

applying advanced data analytics

D.

filtering, normalizing and aggregating data

E.

saving data for a prolonged time period

Buy Now
Questions 8

How does the Cisco router (IR) and switch (IE) portfolio support edge data services?

Options:

A.

Edge data services can be run and managed as containers using Cisco IOx.

B.

Edge data services can run only in virtual machines on a separate compute layer.

C.

Edge data services are aliases for IR/IE configuration services.

D.

Edge data services run as separate instances only on virtual machines.

Buy Now
Questions 9

Refer to the exhibit.

Approximately 4000 oil platforms, each with 400 sensors, are spread in the Gulf of Mexico and all of their data must come together into one dashboard. Which general architecture should be selected to connect them?

Options:

A.

4-tier: sensor – edge device (Intel Atom CPU) – fog device (Intel Xeon CPU) – cloud

B.

5-tier: intelligent sensor– edge device (Intel Atom CPU) – fog device (Intel Xeon CPU) – edge data center (Intel Xeon CPU)

C.

2-tier: intelligent sensor – cloud

D.

3-tier: sensor – edge device (Intel Atom CPU) – cloud

Buy Now
Questions 10

An IoT engineer is working on a connected machines project.

Which two protocols must be used during the data provisioning process when data is sent from the shop floor IoT system to the customer’s public cloud? (Choose two.)

Options:

A.

COAP

B.

Modbus TCP

C.

MQTT

D.

AMQP

E.

OPC-DA

Buy Now
Questions 11

Which computer security concept is violated when a web server is written that uses the “root” account for all interactions with a Linux system?

Options:

A.

principle of least privilege

B.

PermitRootLogin

C.

certificate-based authentication

D.

RBAC

Buy Now
Questions 12

A network is being configured for an Ethernet-connected sensor. The sensor fails to send data to the configured destination. The IP address of the sensor can be pinged from a laptop on the same subnet. When a different subnet is used, the sensor cannot be reached, but other clients on the same subnet are still accessible.

What are two reasons for the connectivity problem? (Choose two.)

Options:

A.

wrong DNS server on the sensor

B.

wrong subnet mask on your laptop

C.

wrong default gateway on the sensor

D.

wrong default gateway on your laptop

E.

wrong subnet mask on the sensor

Buy Now
Questions 13

In a secure software development lifecycle process, what must be created as soon as the architecture is in place?

Options:

A.

integration plan

B.

test plan

C.

functional specification document

D.

threat modeling

Buy Now
Questions 14

Which element ensures that PKI is used to establish the identity of IoT devices?

Options:

A.

unique device identifier

B.

encryption key

C.

air gap

D.

hashed routes

Buy Now
Questions 15

Which connector is southbound?

Options:

A.

horizontal connector

B.

cloud connector

C.

device connector

D.

universal connector

Buy Now
Questions 16

When an RS232 device is connected to a Cisco IR829 router, the data collected is not being parsed correctly by the edge application.

Which two steps should be taken to troubleshoot the issue? (Choose two.)

Options:

A.

SSH access on the Cisco IR829 router must be enabled for IOx Guest OS.

B.

Communication mode must be set to half duplex over serial connection.

C.

Serial cable length should not exceed 1.5 meters.

D.

Ensure that communication parameters like baud rate and parity are set correctly.

E.

Set the cable connections based on the PIN layout from the sensor vendor.

Buy Now
Questions 17

Refer to the exhibit.

The red line represents the energy consumption of an industrial machine. Which two statements about the graphs are true? (Choose two.)

Options:

A.

The orange graph is expected to drop to zero for a brief period around the midpoint on the x axis.

B.

The red graph contains the raw data points.

C.

The green graph is the mean value of the data points.

D.

The green graph does not give us any valuable information.

E.

The orange graph has three values on the y-axis.

Buy Now
Questions 18

When constructing a Python script for data extraction using GMM APIs on a Cisco Kinetic Cloud platform, how should the API authentication be implemented?

Options:

A.

Generate the API keys once and edit the permissions as needed.

B.

Generate and use the API keys for the required access level from the Kinetic Cloud application.

C.

Use a complex username and password with 128-bit encryption.

D.

Use a complex username with an auto-generated password from the Kinetic Cloud application.

Buy Now
Exam Code: 300-915
Exam Name: Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT)
Last Update: Jan 22, 2026
Questions: 60
$70  $174.99
$54  $134.99
$46  $114.99
buy now 300-915