Valentine Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Docker > Docker Certified Associate > DCA

DCA Docker Certified Associate (DCA) Exam Question and Answers

Question # 4

In the context of a swarm mode cluster, does this describe a node?

Solution: an instance of the Docker engine participating in the swarm

A.

Yes

B.

No

Full Access
Question # 5

Does this command display all the pods in the cluster that are labeled as env; development'?

Solution. ‘kubectl gel pods --all-namespaces -I 'env in (development)''

A.

Yes

B.

No

Full Access
Question # 6

Will this command display a list of volumes for a specific container?

Solution: docker volume inspect nginx'

A.

Yes

B.

No

Full Access
Question # 7

Is this a supported user authentication method for Universal Control Plane?

Solution. SAML

A.

Yes

B.

No

Full Access
Question # 8

Is this the purpose of Docker Content Trust?

Solution: Verify and encrypt Docker registry TLS.

A.

Yes

B.

No

Full Access
Question # 9

Will this command list all nodes in a swarm cluster from the command line?

Solution: ‘docker Is -a’

A.

Yes

B.

No

Full Access
Question # 10

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object.

Does this command display it?

Solution: kubectl get deployment api

A.

Yes

B.

No

Full Access
Question # 11

One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times. Is this the action taken by the orchestrator to fix the unhealthy container?

Solution: Kubernetes automatically triggers a user-defined script to attempt to fix the unhealthy container.

A.

Yes

B.

No

Full Access
Question # 12

The Kubernetes yaml shown below describes a clusterIP service.

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of this service on port 8080 will be routed to port 80 in a random pod with the label aPP: nginx.

A.

Yes

B.

No

Full Access
Question # 13

Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution. docker logs

A.

Yes

B.

No

Full Access
Question # 14

The following Docker Compose file is deployed as a stack:

Is this statement correct about this health check definition?

Solution: Health checks test for app health ten seconds apart. Three failed health checks transition the container into “unhealthy” status.

A.

Yes

B.

No

Full Access
Question # 15

Will this command display a list of volumes for a specific container?

Solution. ‘docker container inspect nginx’

A.

Yes

B.

No

Full Access
Question # 16

You configure a local Docker engine to enforce content trust by setting the environment variable

DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker image import myorg/myimage:1.0

A.

Yes

B.

No

Full Access
Question # 17

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution: Pass the '--insecure-registry' flag to the daemon at run time.

A.

Yes

B.

No

Full Access
Question # 18

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53/udp dns-cache"

A.

Yes

B.

No

Full Access
Question # 19

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53 -constraint networking.protocol.udp=true dns-cache"

A.

Yes

B.

No

Full Access
Question # 20

A users attempts to set the system time from inside a Docker container are unsuccessful. Could this be blocking this operation?

Solution: Linux capabilities

A.

Yes

B.

No

Full Access
Question # 21

One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times. Is this the action taken by the orchestrator to fix the unhealthy container?

Solution: The unhealthy container is restarted.

A.

Yes

B.

No

Full Access
Question # 22

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution. capabilities

A.

Yes

B.

No

Full Access
Question # 23

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?

Solution. label constraints

A.

Yes

B.

No

Full Access
Question # 24

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A default provisioner is specified, and subsequently a persistentVolumeClaim is created.

A.

Yes

B.

No

Full Access
Question # 25

Is this an advantage of multi-stage builds?

Solution: better caching when building Docker images

A.

Yes

B.

No

Full Access
Question # 26

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution. Create a collection for for each application.

A.

Yes

B.

No

Full Access
Question # 27

The Kubernetes yaml shown below describes a clusterIP service.

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of any pod with the label app: nginx on port 8080 will be forwarded to port 80 in that pod.

A.

Yes

B.

No

Full Access
Question # 28

You configure a local Docker engine to enforce content trust by setting the environment variable DOCKER_C0NTENT_TRUST=l. If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution. docker image build, from a Dockeflle that begins FROM myorg/myimage: l1.0

A.

Yes

B.

No

Full Access
Question # 29

Is this the purpose of Docker Content Trust?

Solution. Sign and verify image tags.

A.

Yes

B.

No

Full Access
Question # 30

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution: ‘docker service create -name dns-cache -p 53:53 -service udp dns-cache'

A.

Yes

B.

No

Full Access
Question # 31

Is this a supported user authentication method for Universal Control Plane?

Solution: PAM

A.

Yes

B.

No

Full Access
Question # 32

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: node taints

A.

Yes

B.

No

Full Access
Question # 33

Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution: docker logs

A.

Yes

B.

No

Full Access
Question # 34

In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository?

Solution: Use the DTR web Ul to make all tags in the repository immutable.

A.

Yes

B.

No

Full Access
Question # 35

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution: net

A.

Yes

B.

No

Full Access
Question # 36

Will this action upgrade Docker Engine CE to Docker Engine EE?

Solution. Run docker engine activate.

A.

Yes

B.

No

Full Access
Question # 37

You want to create a container that is reachable from its host's network. Does this action accomplish this?

Solution: Use network attach to access the containers on the bridge network

A.

Yes

B.

No

Full Access
Question # 38

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution: 'docker service create --name dns-cache -p 53:53/udp dns-cache'

A.

Yes

B.

No

Full Access
Question # 39

Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution: Set the log-driver and log-oPt keys to values for the logging solution (Splunk) In the daemon.json file.

A.

Yes

B.

No

Full Access
Question # 40

Will this command ensure that overlay traffic between service tasks is encrypted?

Solution: docker network create -d overlay -o encrypted=true

A.

Yes

B.

No

Full Access
Question # 41

Will this command display a list of volumes for a specific container?

Solution: docker container logs nginx --volumes'

A.

Yes

B.

No

Full Access
Question # 42

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution. Set and export the IGNORE_TLS environment variable on the command line.

A.

Yes

B.

No

Full Access
Question # 43

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Create one pod and add all the resources needed for each application

A.

Yes

B.

No

Full Access
Question # 44

You want to create a container that is reachable from its host's network. Does this action accomplish this?

Solution: Use --link to access the container on the bridge network.

A.

Yes

B.

No

Full Access