Which data visualization technique should be used to represent an important single metric on a dashboard?
A. heatmap
B. scatter pot
C. gauge
D. treemap
Which connector is southbound?
A. horizontal connector
B. cloud connector
C. device connector
D. universal connector
An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets.
Which method helps to get this implementation accurate from a security point of view?
A. Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.
B. Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets. Machines can be trusted, and they can be issued with static credentials.
C. Maintain a different service associated to secret systems to issue access.
D. After a user is authenticated by any trusted system, the user can be trusted to use any service.
When an RS232 device is connected to a Cisco IR829 router, the data collected is not being parsed correctly by the edge application.
Which two steps should be taken to troubleshoot the issue? (Choose two.)
A. SSH access on the Cisco IR829 router must be enabled for IOx Guest OS.
B. Communication mode must be set to half duplex over serial connection.
C. Serial cable length should not exceed 1.5 meters.
D. Ensure that communication parameters like baud rate and parity are set correctly.
E. Set the cable connections based on the PIN layout from the sensor vendor.
The environment for an Industrial IoT project in a large open pit mine is being scoped. The location has a large amount of dust and the device will be exposed to less than 1 meter of water temporarily.
When the edge device is being chosen, which Ingress protection rating must be used?
A. IP37
B. IP61
C. IP67
D. IP76
Which two statements about how to provision and manage data originators in a cloud environment are true? (Choose two.)
A. The provisioning of digital identities is the responsibility of the data originators.
B. Cloud providers offer services for automated device provisioning, which allows the lifecycle of the cloud-representation for data originators to be managed.
C. Cloud providers offer application programming interfaces, which allow a programmatic provisioning of data originators.
D. There is no need to provision and manage access for data originators in the cloud.
E. The access to public clouds must be configured and managed manually.
Refer to the exhibit. Based on the MQTT client output, which action should be taken so that the connection to the broker can be established?
A. Change the username/password.
B. Open port 1883 on the network firewall.
C. Change the IP address of the broker.
D. Add the certificate.
An IOx application is installed via Local Manager. Every time the application is started, it instantly stops.
Which troubleshooting steps should be taken?
A. There is something wrong with the application code itself.
B. Check the startup and entrypoint parameters.
C. Give the IOx application more CPU units.
D. Check local IOx settings, especially the network settings.
What are two functionalities of edge data services? (Choose two.)
A. creating a machine learning data model
B. supporting many interfaces and APIs
C. applying advanced data analytics
D. filtering, normalizing and aggregating data
E. saving data for a prolonged time period
As part of an IoT project, an organization is developing an edge application that will run on a gateway to securely transmit sensor information it receives into an IoT cloud. Based on the Agile software development lifecycle, the development team is planning to implement a CI/CD pipeline.
Which two methods should be suggested to make the software development lifecycle more secure during the implementation and testing? (Choose two.)
A. Perform automated code reviews prior to deployment.
B. Implement auto-provisioning security inspection for the code.
C. Perform on-going penetration testing on the system.
D. Perform a GAP analysis on current security activities and policies.
E. Train members of the team in a secure software development lifecycle methodology such as OWASP.