300-915 Practice Questions
60 real 300-915 exam questions with expert-verified answers and explanations. Page 1 of 2.
- Question #1IoT Security and Management
An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to i...
Dynamic SecretsSecret ManagementIoT SecurityAccess Management - Question #2IoT Strategy and Architecture
Which statement explains the correct position of a PLC within the CPwE architecture?
PLCCPwE architectureIndustrial AutomationPurdue Model - Question #3IoT Data Ingestion and Processing
A sensor reads potentially critical data from an industrial device, but most of the data from the sensor is not critical information and does not change unless a critical event hap...
Sensor Data ProcessingCritical Data HandlingIoT Data WorkflowEdge Filtering - Question #4IoT and Edge Platforms
Refer to the exhibit. When a Docker image is built using this Dockerfile, which two statements are valid on Cisco IOx 1.8 and before? (Choose two.)
DockerfileMulti-stage buildCisco IOxEdge application deployment - Question #5Edge Compute and Network
The environment for an Industrial IoT project in a large open pit mine is being scoped. The location has a large amount of dust and the device will be exposed to less than 1 meter...
Ingress Protection (IP)Device RuggedizationEdge Device SelectionIndustrial IoT - Question #6Edge Compute and Network
Which two commands inside a Docker container on a gateway help to troubleshoot why the compute performance of the device is slowing down? (Choose two.)
Linux CommandsDockerPerformance MonitoringTroubleshooting - Question #7Application Development
Refer to the exhibit. A new application has just been developed as a Docker container. What is the missing step for packaging the container ready for deployment in IOx?
IOxDockerApplication PackagingEdge Compute - Question #8Compute and Analysis
Refer to the exhibit. The graph has been provided by the monitoring team to the IoT Engineer. The red line represents the consumption of energy from an industrial machine. Which tw...
IoT MonitoringData VisualizationTime-Series Analysis - Question #9Compute and Analysis
Which two data sources are used with a visualization tool such as Grafana? (Choose two.)
GrafanaData sourcesTime-series databasesElasticsearch - Question #10IoT Data Ingestion and Processing
A customer is deploying sensors with Cisco IR829 routers in moving trucks to continuously monitor the health of engines using a cloud application. Which data extraction and process...
Edge ProcessingMobile IoTIntermittent ConnectivityData Ingestion Strategy - Question #11Modern Protocols
Refer to the exhibit. Based on the MQTT client output, which action should be taken so that the connection to the broker can be established?
MQTTClient connectionAuthenticationTroubleshooting - Question #12Modern Protocols
Which lightweight protocol is used to send data from the edge compute resources to the cloud?
MQTTIoT ProtocolsEdge to CloudLightweight Messaging - Question #13Edge Compute and Network
Refer to the exhibit. Which protocol is used to make a FlexVPN connection from a Cisco IR829 router to a headend router?
FlexVPNIKEv2VPN ProtocolsEdge Routers - Question #14IoT Data Ingestion and Processing
Which method is used to gather data from a sensor?
Data IngestionEdge ComputingIoT ArchitectureSensor Data - Question #15IoT Security and Management
Which element ensures that PKI is used to establish the identity of IoT devices?
PKIIoT Device IdentitySecurityUnique Identifiers - Question #16Edge Compute and Network
Refer to the exhibit. Which product must be positioned where the "?" is placed to connect these different network levels?
RouterNetwork ConnectivityNetwork DevicesIP Routing - Question #17Security and Privacy
Which computer security concept is violated when a web server is written that uses the "root" account for all interactions with a Linux system?
Security principlesLeast privilegeSystem securityAccess control - Question #18IoT Security and Management
Which method defines the integration of Cisco Industrial Network Director with the Cisco identity Service Engine?
Cisco INDCisco ISEpxGridIntegration - Question #19Modern Protocols
Mosquitto was installed correctly on the Cisco IR829 router as a Cisco IOx application. When the sensor is connected to the broker on the Cisco IR829 router with the default port,...
MQTTIOx ApplicationsAuthenticationTroubleshooting - Question #20IoT Data Ingestion and Processing
What are two functionalities of edge data services? (Choose two.)
Edge Data ProcessingData FilteringData AggregationEdge Storage - Question #21Compute and Analysis
Refer to the exhibit. The red line represents the energy consumption of an industrial machine. Which two statements about the graphs are true? (Choose two.)
Data VisualizationSensor DataData AnalysisTime Series Data - Question #22IoT and Edge Platforms
Refer to the exhibit. When a laptop is connected to a device via a serial connection, which action makes the output readable?
Serial communicationConsole accessBaudrateTroubleshooting - Question #23Edge Compute and Network
Which action should be taken when a southbound device is not connecting?
TroubleshootingIoT ConnectivityEdge GatewaySouthbound Devices - Question #24IoT Security and Management
Refer to the exhibit. The code and the error message that are received when the code is run is presented. What causes issues authenticating with Cisco GMM API using the web-generat...
API AuthenticationAuthentication FailureAPI Key ManagementIoT Platform Security - Question #25Application Development
As part of an IoT project, an organization is developing an edge application that will run on a gateway to securely transmit sensor information it receives into an IoT cloud. Based...
Secure Software Development LifecycleCI/CD SecuritySecurity TrainingSecurity Assessment - Question #26Edge Compute and Network
Which option is an commonly used network layer protocol in an loT environment?
IoT ProtocolsNetwork LayerRPLRouting - Question #27IoT Data Ingestion and Processing
A company is collecting data from several thousand machines globally. Which software component in the overall architecture is the next destination of the dataflow after the data ha...
IoT ArchitectureData StorageTime-series DatabaseDataflow - Question #28Compute and Analysis
Which data visualization technique should be used to represent an important single metric on a dashboard?
Data VisualizationDashboard DesignMetricsGauge Chart - Question #29Modern Protocols
When trying to subscribe to an MQTT broker on the internet, the MQTT client is on a private subnet and must be NATed to reach the public broker. What is the expected outcome when t...
MQTTNATNetwork ConnectivityIoT Communication - Question #30Edge Compute and Network
Which two states are applications expected to be seen in when they are managed on Cisco IOx? (Choose two.)
Cisco IOxApplication statesEdge application management - Question #31IoT Strategy and Architecture
Which connector is southbound?
IoT ArchitectureSouthbound CommunicationDevice ConnectivityConnectors - Question #32Application Development
When constructing a Python script for data extraction using GMM APIs on a Cisco Kinetic Cloud platform, how should the API authentication be implemented?
API AuthenticationCisco Kinetic CloudPython ScriptingData Extraction - Question #33Edge Compute and Network
Drag and Drop Question An engineering team developed a solution that gathers data via a proprietary protocol (TCP/IP based) to a IR1101 gateway, which then sends the data to the cl...
IoT Gateway ConfigurationEdge ComputeData IngestionCloud Connectivity - Question #34IoT and Edge Platforms
Drag and Drop Question The network team of a large international airport is creating a sensor network on their site using the Cisco LoRaWAN solution. Drag and drop the actions from...
Cisco LoRaWANSensor networkIoT deploymentNetwork implementation - Question #35Application Development
Drag and Drop Question Drag and drop the Dockerfile instructions from the left onto the correct arguments on the right. Answer:
DockerfileDockerContainerizationApplication Packaging - Question #36Edge Compute and Network
When an RS232 device is connected to a Cisco IR829 router, the data collected is not being parsed correctly by the edge application. Which two steps should be taken to troubleshoot...
RS232Serial CommunicationTroubleshootingEdge Device Connectivity - Question #37Modern Protocols
Refer to the exhibit. Which two statements about MQTT messaging are true? (Choose two.)
MQTTProtocol FeaturesConnection ManagementLast Will and Testament - Question #38Edge Compute and Network
How does the Cisco router (IR) and switch (IE) portfolio support edge data services?
Cisco IR/IEEdge network servicesDevice configurationIoT edge networking - Question #39Application Development
Refer to the exhibit. While troubleshooting an error on an application descriptor for a Docker app in Cisco IOx (package.yaml), the app type appears to be missing. Which app type m...
Cisco IOxDockerYAMLApplication Descriptor - Question #40Modern Protocols
Refer to the exhibit. Which two statements about data flow are true? (Choose two.)
MQTT ProtocolAMQP ProtocolIoT Data FlowApplication Development - Question #41Modern Protocols
What is a major difference of MQTT in terms of design compared to AMQP?
MQTTAMQPMessaging ProtocolsProtocol Design - Question #42Edge Compute and Network
Which two statements define the mechanism for console access of the Guest Operating System from the Cisco IR829 router? (Choose two.)
Guest OS AccessCisco IR829Console ManagementIOx - Question #43Application Development
Which command is used to package a Docker-style Cisco IOx app using ioxclient?
ioxclient CLIIOx application packagingDocker applicationsEdge compute development - Question #44Edge Compute and Network
Drag and Drop Question An application needs to calculate if the product meets a determined quality specification, activate an automation to remove poor quality products, and report...
IoT Edge ProcessingCloud ConnectivitySensor Data HandlingIoT Automation - Question #45IoT Data Ingestion and Processing
Drag and Drop Question Drag and drop the tasks from the left into the correct order on the right for transporting data from sensors to the cloud, in order to extract the machine da...
IoT Data PipelineSensor Data IngestionCloud AnalyticsPredictive Maintenance - Question #46Compute and Analysis
Refer to the exhibit. Which two statements are true? (Choose two.)
Data VisualizationHeatmapGeographic Mapping - Question #47Compute and Analysis
Refer to the exhibit. The code snippet provides information about the packet captures within a network. How can the most used source IP addresses within a specific time be visualiz...
Data VisualizationNetwork Packet AnalysisFrequency DistributionBar Charts - Question #48IoT Security and Management
Which two security approaches help build a strong authentication scheme? (Choose two.)
AuthenticationSession ManagementSecurity Best PracticesAccess Control - Question #49IoT and Edge Platforms
An IOx application is installed via Local Manager. Every time the application is started, it instantly stops. Which troubleshooting steps should be taken?
IOx application troubleshootingEdge application resource managementApplication startup failureCPU allocation - Question #50Application Development
In a secure software development lifecycle process, what must be created as soon as the architecture is in place?
Secure Software Development LifecycleSoftware ArchitectureFunctional SpecificationDevelopment Process