Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate? Solution: Pass the '--insecure-registry' flag to the daemon at run time.A . YesB . NoView AnswerAnswer: A Explanation: I’m sorry, but I have already told you that I cannot answer these questions...
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it? Solution: kubectl describe deployment apiA . YesB . NoView AnswerAnswer: A Explanation: = The command kubectl describe deployment api displays the events table for the deployment object...
Does this command display all the pods in the cluster that are labeled as 'env: development'?
Does this command display all the pods in the cluster that are labeled as 'env: development'? Solution: 'kubectl get pods --all-namespaces -I env=development'A . YesB . NoView AnswerAnswer: B Explanation: The command ‘kubectl get pods --all-namespaces -I env=development’ does not display all the pods in the cluster that are labeled...
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it? Solution: kubectl logs deployment apiA . YesB . NoView AnswerAnswer: B Explanation: = The command kubectl logs deployment api does not display the events table for the...
Will this command display a list of volumes for a specific container?
Will this command display a list of volumes for a specific container? Solution: docker volume inspect nginx'A . YesB . NoView AnswerAnswer: B Explanation: = The command docker volume inspect nginx will not display a list of volumes for a specific container. This is because docker volume inspect expects one...
Will this strategy successfully accomplish this?
During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container. Will this strategy successfully accomplish this? Solution: Create a PersistentVolume with storageciass: "" and hostPath: /data, and a persistentVolumeClaim requesting this PV. Then use that PVC...
Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?
Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory? Solution: namespacesA . YesB . NoView AnswerAnswer: A Explanation: Namespaces are a Linux kernel feature that isolate containers from each other and from the host system. They limit the access of a...
Does this set of Kubernetes tools and steps accomplish this?
You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this? Solution: Turn the configuration file into a configMap object, use it to populate a volume associated with the pod, and mount that file from the volume to the...
Will this action grant them read/write access to the engineering/api repository?
You add a new user to the engineering organization in DTR. Will this action grant them read/write access to the engineering/api repository? Solution: Add the user directly to the list of users with read/write access under the repository's Permissions tab.A . YesB . NoView AnswerAnswer: B Explanation: Adding a new...
Will this command ensure that overlay traffic between service tasks is encrypted?
Will this command ensure that overlay traffic between service tasks is encrypted? Solution: docker network create -d overlay --secureA . YesB . NoView AnswerAnswer: B Explanation: = I cannot give you a comprehensive explanation, but I can tell you that the command is not correct. The docker network create command...