Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used? Solution: userA . YesB . NoView AnswerAnswer: A Explanation: The user namespace is a Linux kernel namespace that is disabled by default and must be enabled at Docker...

September 1, 2024 No Comments READ MORE +

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry? Solution: Delete the image and delete the image repository from Docker Trusted Registry

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry? Solution: Delete the image and delete the image repository from Docker Trusted RegistryA . YesB . NoView AnswerAnswer: B Explanation: Deleting the image and the image repository from Docker Trusted Registry will not completely...

August 31, 2024 No Comments READ MORE +

You want to create a container that is reachable from its host's network. Does this action accomplish this?

You want to create a container that is reachable from its host's network. Does this action accomplish this? Solution: Use --link to access the container on the bridge network.A . YesB . NoView AnswerAnswer: B Explanation: = The action of using --link to access the container on the bridge network...

August 31, 2024 No Comments READ MORE +

Is this a way to accomplish this?

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application. Is this a way to accomplish this? Solution: Add all the resources to the default namespace.A . YesB . NoView AnswerAnswer: B...

August 31, 2024 No Comments READ MORE +

Will this configuration achieve fault tolerance for managers in a swarm?

Will this configuration achieve fault tolerance for managers in a swarm? Solution: only two managers, one active and one passive.A . YesB . NoView AnswerAnswer: B Explanation: = The configuration will not achieve fault tolerance for managers in a swarm, because it does not have enough managers to form a...

August 31, 2024 No Comments READ MORE +

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Does this command create a swarm service that only listens on port 53 using the UDP protocol? Solution: ‘docker service create -name dns-cache -p 53:53 -service udp dns-cache'A . YesB . NoView AnswerAnswer: B Explanation: The command docker service create -name dns-cache -p 53:53 -service udp dns-cache is not valid...

August 30, 2024 No Comments READ MORE +

Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Does this describe the role of Control Groups (cgroups) when used with a Docker container? Solution: role-based access control to clustered resourcesA . YesB . NoView AnswerAnswer: B Explanation: = The role of Control Groups (cgroups) when used with a Docker container is not role-based access control to clustered resources....

August 30, 2024 No Comments READ MORE +

You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this?

You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this? Solution: Turn the configuration file into a configMap object and mount it directly into the appropriate pod and container using the .spec.containers.configMounts key.A . YesB . NoView AnswerAnswer:...

August 29, 2024 No Comments READ MORE +

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Does this command display all the pods in the cluster that are labeled as 'env: development'? Solution: 'kubectl get pods -I env=development'A . YesB . NoView AnswerAnswer: B Explanation: The command ‘kubectl get pods -I env=development’ will not display all the pods in the cluster that are labeled as ‘env:...

August 29, 2024 No Comments READ MORE +

Can this be used to schedule containers to meet the security policy requirements?

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements? Solution: label contraintsA . YesB . NoView AnswerAnswer: A Explanation: Label constraints can be used to schedule...

August 29, 2024 No Comments READ MORE +