Docker Certified Associate Dumps Updated DCA Practice Exam Q&As

In searching for valid dumps to prepare for Docker Certified Associate (DCA) Exam, you can come to DumpsBase to choose updated Docker Certified Associate dumps to read all DCA practice exam questions and answers. Having DCA dump questions as the learning resource is a right choice to learn all the DCA practice questions and answers well before taking actual Docker Certified Associate (DCA) Exam. The most updated DCA exam dumps questions will help you to know all of the important topics of the Docker Certified Associate (DCA) certification exam with ease and you’ll have the ability to pass DCA actual exam devoid of further help on your own.

Docker Certified Associate (DCA) Exam DCA Free Dumps Below

1. Which of the following is supported by control groups?

2. Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: seccomp

3. How do you change the default logging driver for the docker daemon in Linux?

4. A server is running low on disk space.

What command can be used to check the disk usage of images, containers, and volumes for Docker engine?

5. What is the difference between a resource limit and a resource reservation when scheduling services?

6. Which of the following commands is used to display system-wide Docker configuration on a host?

7. Which of the following statements is true about secrets?

8. Will this command list all nodes in a swarm cluster from the command line?

Solution: 'docker swarm nodes'

9. Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Solution: role-based access control to clustered resources

10. In the context of a swarm mode cluster, does this describe a node?

Solution: a virtual machine participating in the swarm

11. In the context of a swarm mode cluster, does this describe a node?

Solution: an instance of the Docker engine participating in the swarm

12. Which one of the following commands will show a list of volumes for a specific container?

13. Which of the following commands starts a Redis container and configures it to always restart unless it is explicitly stopped or Docker is restarted?

14. Is this a type of Linux kernel namespace that provides container isolation?

Solution: Authentication

15. Wha is the purpose of Docker Content Trust?

16. You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?

Solution: kubectl events deployment api

17. You configure a local Docker engine to enforce content trust by setting the environment variable DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker service create myorg/myimage:1.0

18. Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution: docker logs <container-id>

19. The Kubernetes yaml shown below describes a clusterIP service.

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of any pod with the label app: nginx on port 8080 will be forwarded to port 80 in that pod.

20. You want to create a container that is reachable from its host's network.

Does this action accomplish this?

Solution: Use --link to access the container on the bridge network.

21. Which 'docker run' flag lifts cgroup limitations?

22. Is this the purpose of Docker Content Trust?

Solution: Enable mutual TLS between the Docker client and server.

23. How do you configure Docker engine to use a registry that is not configured with TLS certificates from a trusted CA?

24. Is this a function of UCP?

Solution: enforces the deployment of signed images to the cluster

25. The Kubernetes yaml shown below describes a clusterIP service.

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of this service on port 8080 will be routed to port 80 in a random pod with the label aPP: nginx.

26. Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Solution: accounting and limiting of resources

27. Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: namespaces

28. Seven managers are in a swarm cluster.

Is this how should they be distributed across three datacenters or availability zones?

Solution: 3-3-1

29. You created a new service named 'http' and discover it is not registering as healthy.

Will this command enable you to view the list of historical tasks for this service?

Solution: 'docker service ps http'

30. What is the recommended way to configure the daemon flags and environment variables for your Docker daemon in a platform independent way?

31. Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Delete the image and run garbage collection on the Docker Trusted Registry.

32. Is this statement correct?

Solution: A Dockerfile provides instructions for building a Docker image

33. Which of the following commands will create a swarm service which only listens on port 53 using the UDP protocol?

34. After creating a new service named 'http', you notice that the new service is not registering as healthy.

How do you view the list of historical tasks for that service by using the command line?

35. You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution: Add them to a team in the engineering organization that has read/write access to the engineering/api repository.

36. Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Create one namespace for each application and add all the resources to it.

37. Is this an advantage of multi-stage builds?

Solution: optimizes Images by copying artifacts selectively from previous stages

38. Is this a supported user authentication method for Universal Control Plane? Solution: PAM

39. Will this command ensure that overlay traffic between service tasks is encrypted?

Solution: docker network create -d overlay -o encrypted=true <network-name>

40. Some Docker images take time to build through a Continuous Integration environment. You want to speed up builds and take advantage of build caching.

Where should the most frequently changed part of a Docker image be placed in a Dockerfile?

41. Will this command ensure that overlay traffic between service tasks is encrypted?

Solution: docker network create -d overlay --secure

42. Seven managers are in a swarm cluster.

Is this how should they be distributed across three datacenters or availability zones?

Solution: 3-2-2

43. Which set of commands can identify the publishd port(s) for a container? (Choose 1.)

44. Will this configuration achieve fault tolerance for managers in a swarm?

Solution: only two managers, one active and one passive.

45. What is one way of directly transferring a Docker Image from one Docker host in another?

46. You are running only Kubernetes workloads on a worker node that requires maintenance, such as installing patches or an OS upgrade

Which command must be run on the node to gracefully terminate all pods on the node, while marking the node as unschedulable?

47. Will this action upgrade Docker Engine CE to Docker Engine EE?

Solution: Uninstall 'docker-ce' package before installing 'docker-ee' package.

48. A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its address space.

If every pod on this node has exactly two containers in it, how many pods can this address space support on this node?

49. The following Docker Compose file is deployed as a stack:

Is this statement correct about this health check definition?

Solution: Health checks test for app health ten seconds apart. If the test fails, the container will be restarted three times before it gets rescheduled.

50. An application image runs in multiple environments, and each environment uses different certificates and ports, what is the best practice to deploy the containers?

51. What is the purpose of multi-stage builds?

52. A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: label contraints

53. Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Delete the image and delete the image repository from Docker Trusted Registry

54. In the context of a swarm mode cluster, does this describe a node?

Solution: a physical machine participating in the swarm

55. You have deployed a service to swarm.

Which command uses the Docker CLI to set the number of tasks of the services to 5? (choose 2)

56. Will this configuration achieve fault tolerance for managers in a swarm?

Solution: an odd number of manager nodes, totaling more than two

57. Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution: net

58. Which of the following is true about using the '-P' option when creating a new container?

59. In Docker Trusted Registry, how would a user prevent an image, for example 'nginx:latest' from being overwritten by another user with push access to the repository?

60. Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution: user


 

Docker Certified Associate DCA Exam Dumps

Add a Comment

Your email address will not be published. Required fields are marked *