How should we give a user permission to interact with the Docker daemon on a machine without giving them unnecessary additional access?
Correct
Incorrect
Question 2 of 40
2. Question
1 point(s)
Which approach is the most secure for a Docker client to authenticate with a registry that employs a self-signed certificate?
Correct
Incorrect
Question 3 of 40
3. Question
1 point(s)
What would be the best way to start a new swarm cluster?
Correct
Incorrect
Question 4 of 40
4. Question
1 point(s)
Sally wants to prevent Docker Swarm encryption keys from being stored insecurely on her swarm managers. How can she tackle enforcing a lock on the swarm cluster?
Correct
Incorrect
Question 5 of 40
5. Question
1 point(s)
Which devicemapper mode should we use for a production environment?
Correct
Incorrect
Question 6 of 40
6. Question
1 point(s)
In Kubernetes, Which of the following is needed in order to expand a PersistentVolumeClaim?
Correct
Incorrect
Question 7 of 40
7. Question
1 point(s)
Which of the following commands would we use to view a container’s logs?
Correct
Incorrect
Question 8 of 40
8. Question
1 point(s)
How would we go about keeping track of changes made to an image in source control (i.e., git)?
Correct
Incorrect
Question 9 of 40
9. Question
1 point(s)
A Kubernetes Pod is using a PersistentVolumeClaim for storage. The Pod is deleted, along with the PersistentVolumeClaim. Which of the following configurations would allow the PersistentVolume to be re-used without manual intervention?
Correct
Incorrect
Question 10 of 40
10. Question
1 point(s)
Which of the following commands will attach the tasks of a new service to an existing overlay network called my-overlay?
Correct
Incorrect
Question 11 of 40
11. Question
1 point(s)
Which of the following is true of filesystem storage models? (Choose two)
Correct
Incorrect
Question 12 of 40
12. Question
1 point(s)
What procedure should we follow to upgrade the Docker engine on an Ubuntu server?
Correct
Incorrect
Question 13 of 40
13. Question
1 point(s)
Sara wants to run a container using the busybox image, and she wants to pass a custom command to the container: echo Docker is great!. Which of the following commands will accomplish this?
Correct
Incorrect
Question 14 of 40
14. Question
1 point(s)
What tool should we use if we need to manage a multi-container application as a unit on a single Docker host?
Correct
Incorrect
Question 15 of 40
15. Question
1 point(s)
What type of data exists in the writable file system layer created by a container?
Correct
Incorrect
Question 16 of 40
16. Question
1 point(s)
How can we use multi-stage builds to generate small, efficient Docker images?
Correct
Incorrect
Question 17 of 40
17. Question
1 point(s)
What would a container generated from the following Dockerfile’s runtime working directory be?
FROM alpine
WORKDIR /x
WORKDIR /y
WORKDIR z
CMD pwd
Correct
Incorrect
Question 18 of 40
18. Question
1 point(s)
Which of the following statements about docker images is correct?
Correct
Incorrect
Question 19 of 40
19. Question
1 point(s)
In the Universal Control Plane, we have a group of people who require comparable permissions (UCP). Instead of providing unique access to each person one by one, how can we manage their permissions as a group?
Correct
Incorrect
Question 20 of 40
20. Question
1 point(s)
Which of the following commands can result in a new named volume being created?
Correct
Incorrect
Question 21 of 40
21. Question
1 point(s)
What command will help us delete a service called my-service along with all of its tasks?
Correct
Incorrect
Question 22 of 40
22. Question
1 point(s)
Which network driver connects containers directly to a network stack on the host machine without any isolation?
Correct
Incorrect
Question 23 of 40
23. Question
1 point(s)
Which of the following statements about Docker image vulnerability scanning is accurate?
Correct
Incorrect
Question 24 of 40
24. Question
1 point(s)
Which of the following statements about the none network driver is accurate?
Correct
Incorrect
Question 25 of 40
25. Question
1 point(s)
We have some containerized software that needs to have a reference to the hostname of the node that the software is running on. Which of the following commands will let us pass the node hostname as an environment variable into each task in a service?
Correct
Incorrect
Question 26 of 40
26. Question
1 point(s)
Some of Daniel’s nodes have labels on them that describe each node’s availability zone. He wants to run a service without the availability_zone=east label that can execute tasks on any node. What instruction should he issue?
Correct
Incorrect
Question 27 of 40
27. Question
1 point(s)
How can we guarantee that every node gets the updated unlock-key for a docker swarm?
Correct
Incorrect
Question 28 of 40
28. Question
1 point(s)
Which of the following statements concerning private Docker registries is accurate?
Correct
Incorrect
Question 29 of 40
29. Question
1 point(s)
What accomplishes the CMD directive?
Correct
Incorrect
Question 30 of 40
30. Question
1 point(s)
Which of the following claims about the WORKDIR directive is false?
Correct
Incorrect
Question 31 of 40
31. Question
1 point(s)
How can we convert a multi-layered image that already exists into a single layer?
Correct
Incorrect
Question 32 of 40
32. Question
1 point(s)
What Linux feature does Docker employ to restrict the amount of memory used by containers?
Correct
Incorrect
Question 33 of 40
33. Question
1 point(s)
Nancy wants to use the foo image to run a container. She desires to publish port 3001 from the container to port 5050 on the host. Which of the subsequent commands will make this happen?
Correct
Incorrect
Question 34 of 40
34. Question
1 point(s)
Which of the following statements most accurately sums up the process for backing up metadata from the Universal Control Plane (UCP)?
Correct
Incorrect
Question 35 of 40
35. Question
1 point(s)
What distinguishes a worker from a manager in a Docker swarm?
Correct
Incorrect
Question 36 of 40
36. Question
1 point(s)
A new Docker server has been put up by Bob. The overlay2 driver is the server’s default, but he prefers to use devicemapper. How could this modification be put into practice?
Correct
Incorrect
Question 37 of 40
37. Question
1 point(s)
Amanda wants to use a Docker container to complete a one-time task. However, this task occasionally fails and needs to be redone. If it fails, Amanda does not want to manually restart it. Which command should she issue to guarantee that the container successfully completes the one-time job?
Correct
Incorrect
Question 38 of 40
38. Question
1 point(s)
Which of the following is not included in a metadata backup of the Docker Trusted Registry (DTR)?
Correct
Incorrect
Question 39 of 40
39. Question
1 point(s)
Which of the following allows users to confidently deploy images?
Correct
Incorrect
Question 40 of 40
40. Question
1 point(s)
Which of the following commands can be used to add an image tag?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.