Free Certification Practice Questions

MIRANTIS-DCA

Loading…
What is the difference between the ADD and COPY Dockerfile instructions?
#1
When an application being managed by UCP fails, you would like a summary of all requests made to the UCP API in the hours leading up to the failure.What must be configured correctly beforehand for this to be possible?
#2
A user’s attempts to set the system time from inside a Docker container are unsuccessful.Could this be blocking this operation?SELinux
#3
One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times.Is this the action taken by the orchestrator to fix the unhealthy container?The unhealthy container is restarted.
#4
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?Set INSECURE_REGISTRY in the ‘/etc/docker/default’ configuration file.
#5
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?Set and export the IGNORE_TLS environment variable on the command line.
#6
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?Pass the ‘--insecure registry’ flag to the daemon at run time.
#7
Is this an advantage of multi-stage builds?better logical separation of Dockerfile instructions for increased readability
#8
Is this an advantage of multi-stage builds?better caching when building Docker images
#9
You add a new user to the engineering organization in DTR.Will this action grant them read/write access to the engineering/api repository?Add the user directly to the list of users with read/write access under the repository’s Permissions tab.
#10
You add a new user to the engineering organization in DTR.Will this action grant them read/write access to the engineering/api repository?Mirror the engineering/api repository to one of the user’s own private repositories.
#11
You add a new user to the engineering organization in DTR.Will this action grant them read/write access to the engineering/api repository?Add them to a team in the engineering organization that has read/write access to the engineering/api repository.
#12
Seven managers are in a swarm cluster.Is this how should they be distributed across three datacenters or availability zones?3-2-2
#13
Seven managers are in a swarm cluster.Is this how should they be distributed across three datacenters or availability zones?5-1-1
#14
Is this a function of UCP?image role-based access control
#15
Is this a function of UCP?enforces the deployment of signed images to the cluster
#16
Is this the purpose of Docker Content Trust?Enable mutual TLS between the Docker client and server.
#17
Is this the purpose of Docker Content Trust?Sign and verify image tags.
#18
Is this the purpose of Docker Content Trust?Indicate an image on Docker Hub is an official image.
#19
In the context of a swarm mode cluster, does this describe a node? an instance of the Docker CLI connected to the swarm
#20
In the context of a swarm mode cluster, does this describe a node? a virtual machine participating in the swarm
#21
Is this a supported user authentication method for Universal Control Plane?SAML
#22
Is this a supported user authentication method for Universal Control Plane?X.500
#23
Is this statement correct?A Dockerfile stores persistent data between deployments of a container.
#24
Will this command ensure that overlay traffic between service tasks is encrypted? docker network create -d overlay --secure <network-name>
#25
An application image runs in multiple environments, with each environment using different certificates and ports. Is this a way to provision configuration to containers at runtime?Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates.
#26
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?Delete the image and delete the image repository from Docker Trusted Registry
#27
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?Delete the image and run garbage collection on the Docker Trusted Registry.
#28
Does this describe the role of Control Groups (cgroups) when used with a Docker container? user authorization to the Docker API
#29
Does this describe the role of Control Groups (cgroups) when used with a Docker container? role-based access control to clustered resources
#30