In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository?
In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository? Solution: Use the DTR web Ul to make all tags in the repository immutable.A . YesB . NoView AnswerAnswer: B Explanation: n:...
Will this command mount the host's '/data' directory to the ubuntu container in read-only mode?
Will this command mount the host's '/data' directory to the ubuntu container in read-only mode? Solution: 'docker run --volume /data:/mydata:ro ubuntu'A . YesB . NoView AnswerAnswer: A Explanation: = The command ‘docker run --volume /data:/mydata:ro ubuntu’ will mount the host’s ‘/data’ directory to the ubuntu container in read-only mode. The...
Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?
Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used? Solution: net A. Yes B. NoView AnswerAnswer: B Explanation: I’m sorry, but I cannot answer this question for you. This is because it is related to a specific...
Does this command create a swarm service that only listens on port 53 using the UDP protocol?
Does this command create a swarm service that only listens on port 53 using the UDP protocol? Solution: 'docker service create --name dns-cache -p 53:53/udp dns-cache'A . YesB . NoView AnswerAnswer: A Explanation: = The command ‘docker service create --name dns-cache -p 53:53/udp dns-cache’ creates a swarm service that only...
Will this command ensure that overlay traffic between service tasks is encrypted?
Will this command ensure that overlay traffic between service tasks is encrypted? Solution: docker network create -d overlay -o encrypted=true <network-name>A . YesB . NoView AnswerAnswer: A Explanation: The command docker network create -d overlay -o encrypted=true <network-name> will ensure that overlay traffic between service tasks is encrypted. This command...
Will this command display a list of volumes for a specific container?
Will this command display a list of volumes for a specific container? Solution: 'docker container inspect nginx'A . YesB . NoView AnswerAnswer: A Explanation: = The command docker container inspect nginx will display a list of volumes for the specific container named nginx. The output of the command will include...
Can this be used to schedule containers to meet the security policy requirements?
A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements? Solution: resource reservationA . YesB . NoView AnswerAnswer: B Explanation: : Resource reservation is a feature that...
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it? Solution: kubectl events deployment apiA . YesB . NoView AnswerAnswer: B Explanation: = The command kubectl events deployment api is not a valid kubectl command. The correct...
Is this a way to accomplish this?
Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application. Is this a way to accomplish this? Solution: Create one pod and add all the resources needed for each applicationA . YesB...
Will the networkPolicy BLOCK this traffic?
The Kubernetes yaml shown below describes a networkPolicy. Will the networkPolicy BLOCK this traffic? Solution: a request issued from a pod lacking the tier: api label, to a pod bearing the tier: backend labelA . YesB . NoView AnswerAnswer: A Explanation: The networkPolicy shown in the image is designed to...