Will this configuration achieve fault tolerance for managers in a swarm?
Solution: one manager node for two worker nodes
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?
Solution: Delete the image and run garbage collection on the Docker Trusted Registry.
Is this a function of UCP?
Solution: scans images to detect any security vulnerability
Will this command ensure that overlay traffic between service tasks is encrypted?
Solution: docker service create --network --encrypted
Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?
Solution: A default storageClass is specified, and subsequently a persistentVolumeClaim is created.
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?
Solution. Delete the image and delete the image repository from Docker Trusted Registry.
Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?
Solution: namespaces
Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.
Is this a way to accomplish this?
Solution: Create one namespace for each application and add all the resources to it.