0 of 40 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 40 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Current
Review
Answered
Correct
Incorrect
Question 1 of 40
1 point(s)
How should we give a user permission to interact with the Docker daemon on a machine without giving them unnecessary additional access?
Question 2 of 40
1 point(s)
Which approach is the most secure for a Docker client to authenticate with a registry that employs a self-signed certificate?
Question 3 of 40
1 point(s)
What would be the best way to start a new swarm cluster?
Question 4 of 40
1 point(s)
Sally wants to prevent Docker Swarm encryption keys from being stored insecurely on her swarm managers. How can she tackle enforcing a lock on the swarm cluster?
Question 5 of 40
1 point(s)
Which devicemapper mode should we use for a production environment?
Question 6 of 40
1 point(s)
In Kubernetes, Which of the following is needed in order to expand a PersistentVolumeClaim?
Question 7 of 40
1 point(s)
Which of the following commands would we use to view a container’s logs?
Question 8 of 40
1 point(s)
How would we go about keeping track of changes made to an image in source control (i.e., git)?
Question 9 of 40
1 point(s)
A Kubernetes Pod is using a PersistentVolumeClaim for storage. The Pod is deleted, along with the PersistentVolumeClaim. Which of the following configurations would allow the PersistentVolume to be re-used without manual intervention?
Question 10 of 40
1 point(s)
Which of the following commands will attach the tasks of a new service to an existing overlay network called my-overlay?
Question 11 of 40
1 point(s)
Which of the following is true of filesystem storage models? (Choose two)
Question 12 of 40
1 point(s)
What procedure should we follow to upgrade the Docker engine on an Ubuntu server?
Question 13 of 40
1 point(s)
Sara wants to run a container using the busybox image, and she wants to pass a custom command to the container: echo Docker is great!. Which of the following commands will accomplish this?
Question 14 of 40
1 point(s)
What tool should we use if we need to manage a multi-container application as a unit on a single Docker host?
Question 15 of 40
1 point(s)
What type of data exists in the writable file system layer created by a container?
Question 16 of 40
1 point(s)
How can we use multi-stage builds to generate small, efficient Docker images?
Question 17 of 40
1 point(s)
What would a container generated from the following Dockerfile’s runtime working directory be?
FROM alpine
WORKDIR /x
WORKDIR /y
WORKDIR z
CMD pwd
Question 18 of 40
1 point(s)
Which of the following statements about docker images is correct?
Question 19 of 40
1 point(s)
In the Universal Control Plane, we have a group of people who require comparable permissions (UCP). Instead of providing unique access to each person one by one, how can we manage their permissions as a group?
Question 20 of 40
1 point(s)
Which of the following commands can result in a new named volume being created?
Question 21 of 40
1 point(s)
What command will help us delete a service called my-service along with all of its tasks?
Question 22 of 40
1 point(s)
Which network driver connects containers directly to a network stack on the host machine without any isolation?
Question 23 of 40
1 point(s)
Which of the following statements about Docker image vulnerability scanning is accurate?
Question 24 of 40
1 point(s)
Which of the following statements about the none network driver is accurate?
Question 25 of 40
1 point(s)
We have some containerized software that needs to have a reference to the hostname of the node that the software is running on. Which of the following commands will let us pass the node hostname as an environment variable into each task in a service?
Question 26 of 40
1 point(s)
Some of Daniel’s nodes have labels on them that describe each node’s availability zone. He wants to run a service without the availability_zone=east label that can execute tasks on any node. What instruction should he issue?
Question 27 of 40
1 point(s)
How can we guarantee that every node gets the updated unlock-key for a docker swarm?
Question 28 of 40
1 point(s)
Which of the following statements concerning private Docker registries is accurate?
Question 29 of 40
1 point(s)
What accomplishes the CMD directive?
Question 30 of 40
1 point(s)
Which of the following claims about the WORKDIR directive is false?
Question 31 of 40
1 point(s)
How can we convert a multi-layered image that already exists into a single layer?
Question 32 of 40
1 point(s)
What Linux feature does Docker employ to restrict the amount of memory used by containers?
Question 33 of 40
1 point(s)
Nancy wants to use the foo image to run a container. She desires to publish port 3001 from the container to port 5050 on the host. Which of the subsequent commands will make this happen?
Question 34 of 40
1 point(s)
Which of the following statements most accurately sums up the process for backing up metadata from the Universal Control Plane (UCP)?
Question 35 of 40
1 point(s)
What distinguishes a worker from a manager in a Docker swarm?
Question 36 of 40
1 point(s)
A new Docker server has been put up by Bob. The overlay2 driver is the server’s default, but he prefers to use devicemapper. How could this modification be put into practice?
Question 37 of 40
1 point(s)
Amanda wants to use a Docker container to complete a one-time task. However, this task occasionally fails and needs to be redone. If it fails, Amanda does not want to manually restart it. Which command should she issue to guarantee that the container successfully completes the one-time job?
Question 38 of 40
1 point(s)
Which of the following is not included in a metadata backup of the Docker Trusted Registry (DTR)?
Question 39 of 40
1 point(s)
Which of the following allows users to confidently deploy images?
Question 40 of 40
1 point(s)
Which of the following commands can be used to add an image tag?