DRAG DROP
Drag and drop the Dockerfile instructions from the left onto the correct arguments on the right.
Select and Place:
DRAG DROP
Drag and drop the tasks from the left into the correct order on the right for transporting data from sensors to the cloud, in order to extract the machine data and use the cloud-based analytics for predictive maintenance.
Select and Place:
When trying to subscribe to an MQTT broker on the internet, the MQTT client is on a private subnet and must be NATed to reach the public broker.
What is the expected outcome when this configuration is in place?
A. The client periodically reconnects to the default gateway.
B. The client connects only once using the PENDING message to the broker.
C. The client periodically reconnects to the broker over the NAT connection.
D. The client connects only once using the CONNECT massage to the broker.
Which connector is southbound?
A. horizontal connector
B. cloud connector
C. device connector
D. universal connector
A sensor reads potentially critical data from an industrial device, but most of the data from the sensor is not critical information and does not change unless a critical event happens.
Which data work flow is appropriate for how the critical and non-critical data is processed?
A. 1. Acquire sensor data.
2.
Filter non-actionable data.
3.
Perform action on data.
4.
Send critical data and action performed on data to cloud for storing.
B. 1. Acquire sensor data.
2.
Send data to cloud for processing and to determine action.
3.
Send required action back to edge for action completion.
4.
Perform action on data.
C. 1. Acquire sensor data.
2.
Filter non-actionable data.
3.
Perform action on data.
D. 1. Acquire sensor data.
2.
Perform action on data.
3.
Send data and action performed on data to cloud for recording.
Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)
A. The provisioning of digital identities is the responsibility of the data originators.
B. Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud-representation for data originators to be managed.
C. Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.
D. There is no need to provision and manage access for data originators in the cloud.
E. The access to public clouds must be configured and managed manually.
Refer to the exhibit. Which product must be positioned where the "?" is placed to connect these different network levels?
A. firewall
B. switch
C. router
D. wireless access port
Which action should be taken when a southbound device is not connecting?
A. Verify the gateway link status.
B. Review the edge application logs.
C. Verify the sensor status.
D. Redeploy the edge application.
Refer to the exhibit. The code and the error message that are received when the code is run is presented.
What causes issues authenticating with Cisco GMM API using the web-generated API key?
A. firewall that blocks authentication ports
B. incorrect username and password
C. incorrect GMM Cluster selection
D. incorrect key size and data encryption
Which command is used to package a Docker-style Cisco IOx app using ioxclient?
A. ioxclient docker create helloworld:1.0.
B. ioxclient docker-app helloworld:1.0.
C. ioxclient docker package helloworld:1.0.
D. ioxclient docker helloworld:1.0.