Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco Cisco Certified DevNet Professional 300-915 New Questions

Page: 2 / 2
Total 60 questions

Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) Questions and Answers

Question 5

Which two security approaches help build a strong authentication scheme? (Choose two.)

Options:

A.

connection based on location

B.

session IDs accepted only from cookies

C.

maximum allowed connections

D.

user logout

E.

session logout because of inactivity

Question 6

Refer to the exhibit.

A new application has just been developed as a Docker container. What is the missing step for packaging the container ready for deployment in IOx?

Options:

A.

Pull/push the image to the Docker registry.

B.

Build the package.yaml files.

C.

Build the package.cert file to sign the app.

D.

Log in to device manager and load the application.

Question 7

Which data visualization technique should be used to represent an important single metric on a dashboard?

Options:

A.

heatmap

B.

scatter pot

C.

gauge

D.

treemap

Question 8

Which element ensures that PKI is used to establish the identity of IoT devices?

Options:

A.

unique device identifier

B.

encryption key

C.

air gap

D.

hashed routes

Page: 2 / 2
Total 60 questions