What is the purpose of a client bundle in the Universal Control Plane?
A.
Authenticate a user using client certificates to the Universal Control Plane
B.
Provide a new user instructions for how to login to the Universal Control Plane
C.
Provide a user with a Docker client binary compatible with the Universal Control Plane
D.
Group multiple users in a team in the Universal Control Plane
Authenticate a user using client certificates to the Universal Control Plane
Which of the following is true about using the '-P' option when creating a new container?
A.
Docker binds each exposed container port to a random port on all the host's interface
B.
Docker gives extended privileges to the container.
C.
Docker binds each exposed container port to a random port on a specified host interface
D.
Docker binds each exposed container port with the same port on the host
Docker binds each exposed container port to a random port on all the host's interface
A service 'wordpress' is running using a password string to connect to a non-Dockerized database service. The password string is passed into the 'wordpress' service as a Docker secret. Per security policy, the password on the database was changed. Identity the correct sequence of steps to rotate the secret from the old password to the new password.
A.
Create a new docker secret with the new password. Trigger a rolling secret update by using the 'docker
secret update' command
B.
Trigger an update to the service by using 'docker service update --secret=<new password>'
C.
Create a new docker secret with the new password. Remove the existing service using 'docker service
rm'. Start a new service with the new secret using "--secret=<new password>"
D.
Create a new docker secret with a new password. Trigger a rolling update of the "wordpress" service, by
using "--secret-rm" & "--secret-add" to remove the old secret and add the updated secret.
Create a new docker secret with a new password. Trigger a rolling update of the "wordpress" service, by
using "--secret-rm" & "--secret-add" to remove the old secret and add the updated secret.
An application image runs in multiple environments, and each environment uses different certificates and
ports, what is the best practice to deploy the containers?
A.
Create a Dockerfile for each environment, specifying ports and ENV variables for certificates.
B.
Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates.
C.
Create images that contain the specific configuration for every environment.
D.
Create a config file for each environment.
Create a config file for each environment.
A docker service 'web' is running with a scale factor of 1 (replicas = 1).
Bob intends to use the command 'docker service update -replicas=3 web'.
Alice intends to use the command 'docker service scale web=3'.
How do the outcomes oft these two commands differ?
A.
Bob's command results in an error. Alice's command updates the number of replicas of the 'web' service
to 3.
B.
Bob's command only updates the service definition, but no new replicas are started. Alice's command
results in the actual scaling up of the 'web' service.
C.
Bob's command updates the number of replicas of the 'web' service to 3. Alice's command results in an error.
D.
Both Bob's and Alice's commands result in exactly the same outcome, which is 3 instances of the 'web'
service.
Both Bob's and Alice's commands result in exactly the same outcome, which is 3 instances of the 'web'
service.
What is one way of directly transferring a Docker Image from one Docker host in another?
A.
'docker push' the image to the IP address of the target host.
B.
'docker commit' to save the image outside of the Docker filesystem. Then transfer the file over to the
target host and 'docker start' to start the container again.
C.
There is no way of directly transferring Docker images between hosts. A Docker Registry must be used
ad an intermediary.
D.
'docker save' the image to save it as TAR file and copy it over to the target host. Then use 'docker load'
to un-TAR the image back as a Docker image.
'docker save' the image to save it as TAR file and copy it over to the target host. Then use 'docker load'
to un-TAR the image back as a Docker image.
Which of the following is NOT backed up when performing a Docker Trusted backup operation?
A.
Access control to repos and images
B.
Repository metadata
C.
Image blobs
D.
DTR configurations
Image blobs
A server is running low on disk space. What command can be used to check the disk usage of images,
containers, and volumes for Docker engine?
A.
'docker system df'
B.
'docker system prune'
C.
'docker system free'
D.
'docker system ps'
'docker system df'
A user is having problems running Docker. Which of the following will start Docker in debug mode?
A.
Set the debug key to true in the 'daemon.json' file.
B.
Start the 'dockerd' process manually with the '--logging' flag set to debug
C.
Set the logging key to debug in the 'daemon.json' file.
D.
Start the 'dockerd' process manually with the '--raw-logs' flag set to debug
Set the debug key to true in the 'daemon.json' file.
What is the difference between a resource limit and a resource reservation when scheduling services?
A.
A resource limit and a resource reservation can be used interchangeably.
B.
A resource limit is a soft limit for your service, while a reservation is hard limit and the docker engine
will do its best to keep your service at the limit.
C.
A resource limit is used to find a host with adequate resources for scheduling a hard limit for your
service, while a reservation is hard limit for your service.
D.
A resource limit is hard limit for your service, while a reservation is used to find a host with adequate resources for scheduling. Correct
A resource limit and a resource reservation can be used interchangeably.
Page 4 out of 17 Pages |
Previous |