New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DCA Exam Dumps - Docker Certified Associate (DCA) Exam

Go to page:
Question # 9

During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.

Will this strategy successfully accomplish this?

Solution: Add a volume to the pod that sets hostPath.path: /data, and then mount this volume into the pod's containers as desired.

A.

Yes

B.

No

Full Access
Question # 10

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution. Mirror the engineering/api repository to one of the user's own private repositories.

A.

Yes

B.

No

Full Access
Question # 11

An application image runs in multiple environments, with each environment using different certificates and ports.

Is this a way to provision configuration to containers at runtime?

Solution: Create a Dockerfile for each environment, specifying ports and ENV variables for certificates.

A.

Yes

B.

No

Full Access
Question # 12

Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Solution: role-based access control to clustered resources

A.

Yes

B.

No

Full Access
Question # 13

You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this?

Solution: Mount the configuration file directly into the appropriate pod and container using the .spec.containers.configMounts key.

A.

Yes

B.

No

Full Access
Question # 14

Your organization has a centralized logging solution, such as Sptunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution. docker system events- -filter splunk

A.

Yes

B.

No

Full Access
Question # 15

Will this command ensure that overlay traffic between service tasks is encrypted?

Solution: docker network create -d overlay --secure

A.

Yes

B.

No

Full Access
Question # 16

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?

Solution: kubectl logs deployment api

A.

Yes

B.

No

Full Access
Go to page: