Will this command ensure that overlay traffic between service tasks is encrypted?
Will this command ensure that overlay traffic between service tasks is encrypted? Solution: docker network create -d overlay -o encrypted=true <network-name>A . YesB . NoView AnswerAnswer: A
Will this configuration achieve fault tolerance for managers in a swarm?
Will this configuration achieve fault tolerance for managers in a swarm? Solution: only two managers, one active and one passive.A . YesB . NoView AnswerAnswer: B
How do you change the default logging driver for the docker daemon in Linux?
How do you change the default logging driver for the docker daemon in Linux?A . Set the value of log-driver to the name of the logging driver In the daemon.json In /etc/docB . Use the -log-driver' flag when you run a container.C . At the command line, type: docker log...
What is the purpose of multi-stage builds?
What is the purpose of multi-stage builds?A . Better logical separation of Dockerfile instructions for better readabilityB . Optimizing images by copying artifacts selectively from previous stagesC . Better caching when building Docker imagesD . Faster image builds by allowing parallel execution of Docker buildsView AnswerAnswer: B
Will this configuration achieve fault tolerance for managers in a swarm?
Will this configuration achieve fault tolerance for managers in a swarm? Solution: an odd number of manager nodes, totaling more than twoA . YesB . NoView AnswerAnswer: A
Is this a type of Linux kernel namespace that provides container isolation?
Is this a type of Linux kernel namespace that provides container isolation? Solution: AuthenticationA . YesB . NoView AnswerAnswer: A
What is one way of directly transferring a Docker Image from one Docker host in another?
What is one way of directly transferring a Docker Image from one Docker host in another?A . 'docker push' the image to the IP address of the target host.B . 'docker commit' to save the image outside of the Docker filesystem. Then transfer the file over to the target host...
How do you configure Docker engine to use a registry that is not configured with TLS certificates from a trusted CA?
How do you configure Docker engine to use a registry that is not configured with TLS certificates from a trusted CA?A . Set IGNORE_TLS in the 'daemon.json' configuration file.B . Set and export the IGNORE_TLS environment variable on the command lineC . Set INSECURE_REGISTRY in the '/etc/docker/default' configuration fileD ....
Where should the most frequently changed part of a Docker image be placed in a Dockerfile?
Some Docker images take time to build through a Continuous Integration environment. You want to speed up builds and take advantage of build caching. Where should the most frequently changed part of a Docker image be placed in a Dockerfile?A . at the bottom of the DockerfileB . after the...
Which of the following statements is true about secrets?
Which of the following statements is true about secrets?A . Secrets can be created from any node in the cluster.B . Secrets can be modified after they are created.C . Secret are stored unencrypted on manager nodes.D . Secrets can be created using standard input (STDIN) and a file.View AnswerAnswer:...