Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

DCA Docker Certified Associate (DCA) Exam Questions and Answers

Questions 4

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A default provisioner is specified, and subsequently a persistentVolumeClaim is created.

Options:

A.

Yes

B.

No

Buy Now
Questions 5

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: label contraints

Options:

A.

Yes

B.

No

Buy Now
Questions 6

You want to mount external storage to a particular filesystem path in a

container in a Kubernetes pod.

What is the correct set of objects to use for this?

Options:

A.

a persistentVolume in the pod specification, populated with a persistentVolumeClaim which is bound to a volume defined by a storageClass

B.

a storageClass in the pod's specification, populated with a volume which is bound to a provisioner defined by a persistentVolume

C.

a volume in the pod specification, populated with a storageClass which is bound to a provisioner defined by a persistentVolume

D.

a volume in the pod specification, populated with a persistentVolumeClaim bound to a persistentVolume defined by a storageClass

Buy Now
Questions 7

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution: Add them to a team in the engineering organization that has read/write access to the engineering/api repository.

Options:

A.

Yes

B.

No

Buy Now
Questions 8

Does this command display all the pods in the cluster that are labeled as env; development'?

Solution. ‘kubectl gel pods --all-namespaces -I 'env in (development)''

Options:

A.

Yes

B.

No

Buy Now
Questions 9

Is this a type of Linux kernel namespace that provides container isolation?

Solution: Storage

Options:

A.

Yes

B.

No

Buy Now
Questions 10

Your organization has a centralized logging solution, such as Sptunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution. docker system events- -filter splunk

Options:

A.

Yes

B.

No

Buy Now
Questions 11

Will This command list all nodes in a swarm cluster from the command line?

Solution. ‘docker swarm nodes'

Options:

A.

Yes

B.

No

Buy Now
Questions 12

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Solution: 'kubectl get pods --all-namespaces -label env=development'

Options:

A.

Yes

B.

No

Buy Now
Questions 13

Can this set of commands identify the published port(s) for a container?

Solution: `docker network inspect', `docker port'

Options:

A.

Yes

B.

No

Buy Now
Questions 14

During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.

Will this strategy successfully accomplish this?

Solution: Create a PersistentVolume with storageciass: "" and hostPath: /data, and a persistentVolumeClaim requesting this PV. Then use that PVC to populate a volume in a pod

Options:

A.

Yes

B.

No

Buy Now
Questions 15

Will this command list all nodes in a swarm cluster from the command line?

Solution: 'docker swarm nodes'

Options:

A.

Yes

B.

No

Buy Now
Questions 16

You created a new service named 'http' and discover it is not registering as healthy. Will this command enable you to view the list of historical tasks for this service?

Solution: 'docker service ps http'

Options:

A.

Yes

B.

No

Buy Now
Questions 17

You created a new service named 'http* and discover it is not registering as healthy. Will this command enable you to view the list of historical tasks for this service?

Solution. ‘docker inspect http"

Options:

A.

Yes

B.

No

Buy Now
Questions 18

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: cgroups

Options:

A.

Yes

B.

No

Buy Now
Questions 19

Will this command ensure that overlay traffic between service tasks is encrypted?

Solution: docker service create --network --encrypted

Options:

A.

Yes

B.

No

Buy Now
Questions 20

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?

Solution: kubectl events deployment api

Options:

A.

Yes

B.

No

Buy Now
Questions 21

Is this a function of UCP?

Solution: scans images to detect any security vulnerability

Options:

A.

Yes

B.

No

Buy Now
Questions 22

Seven managers are in a swarm cluster.

Is this how should they be distributed across three datacenters or availability zones?

Solution: 4-2-1

Options:

A.

Yes

B.

No

Buy Now
Questions 23

During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.

Will this strategy successfully accomplish this?

Solution: Add a volume to the pod that sets hostPath.path: /data, and then mount this volume into the pod's containers as desired.

Options:

A.

Yes

B.

No

Buy Now
Questions 24

An application image runs in multiple environments, with each environment using different certificates and ports.

Is this a way to provision configuration to containers at runtime?

Solution: Create images that contain the specific configuration for every environment.

Options:

A.

Yes

B.

No

Buy Now
Questions 25

Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution. docker logs

Options:

A.

Yes

B.

No

Buy Now
Questions 26

You configure a local Docker engine to enforce content trust by setting the environment variable

DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker container run myorg/myimage:1.0

Options:

A.

Yes

B.

No

Buy Now
Questions 27

Will this command list all nodes in a swarm cluster from the command line?

Solution. ‘docker inspect nodes

Options:

A.

Yes

B.

No

Buy Now
Questions 28

Will this command ensure that overlay traffic between service tasks is encrypted?

Solution. docker network create -d overlay --secure

Options:

A.

Yes

B.

No

Buy Now
Questions 29

In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository?

Solution: Remove push access from all other users.

Options:

A.

Yes

B.

No

Buy Now
Questions 30

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: resource reservation

Options:

A.

Yes

B.

No

Buy Now
Questions 31

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution. Mirror the engineering/api repository to one of the user's own private repositories.

Options:

A.

Yes

B.

No

Buy Now
Questions 32

You are running only Kubernetes workloads on a worker node that requires

maintenance, such as installing patches or an OS upgrade.

Which command must be run on the node to gracefully terminate all pods on

the node, while marking the node as unschedulable?

Options:

A.

`docker swarm leave'

B.

`docker node update -availability drain

C.

`kubectl drain '

D.

`kubectl cordon

Buy Now
Questions 33

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53 -constraint networking.protocol.udp=true dns-cache"

Options:

A.

Yes

B.

No

Buy Now
Questions 34

Is this the purpose of Docker Content Trust?

Solution: Verify and encrypt Docker registry TLS.

Options:

A.

Yes

B.

No

Buy Now
Questions 35

You configure a local Docker engine to enforce content trust by setting the environment variable

DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker image import myorg/myimage:1.0

Options:

A.

Yes

B.

No

Buy Now
Questions 36

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Create one namespace for each application and add all the resources to it.

Options:

A.

Yes

B.

No

Buy Now
Questions 37

Is this statement correct?

Solution. A Dockerfile stores persistent data between deployments of a container

Options:

A.

Yes

B.

No

Buy Now
Questions 38

Will this command list all nodes in a swarm cluster from the command line?

Solution. ‘docker inspect nodes

Options:

A.

Yes

B.

No

Buy Now
Questions 39

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Delete the image and delete the image repository from Docker Trusted Registry

Options:

A.

Yes

B.

No

Buy Now
Questions 40

Can this set of commands identify the published port(s) for a container?

Solution. ‘docker container inspect", docker port'

Options:

A.

Yes

B.

No

Buy Now
Questions 41

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A persistentVolumeClaim is created that specifies a pre-defined storageClass.

Options:

A.

Yes

B.

No

Buy Now
Questions 42

Is this a supported user authentication method for Universal Control Plane?

Solution. LDAP

Options:

A.

Yes

B.

No

Buy Now
Questions 43

Will this action upgrade Docker Engine CE to Docker Engine EE?

Solution. Run docker engine activate.

Options:

A.

Yes

B.

No

Buy Now
Questions 44

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution: Add the user directly to the list of users with read/write access under the repository's Permissions tab.

Options:

A.

Yes

B.

No

Buy Now
Questions 45

Will a DTR security scan detect this?

Solution. image configuration poor practices, such as exposed ports or inclusion of compilers in production images

Options:

A.

Yes

B.

No

Buy Now
Questions 46

In Kubernetes, to mount external storage to a filesystem path in a container within a pod, you would use a volume in the pod specification. This volume is populated with a persistentVolumeClaim that is bound to an existing persistentVolume. The persistentVolume is defined and managed by the storageClass which provides dynamic or static provisioning of the volume and determines what type of storage will be provided1. References:

•Dynamic Volume Provisioning | Kubernetes

Is this a supported user authentication method for Universal Control Plane?

Solution: Docker ID

Options:

A.

Yes

B.

No

Buy Now
Questions 47

Will a DTR security scan detect this?

Solution: licenses for known third party binary components

Options:

A.

Yes

B.

No

Buy Now
Questions 48

Is this statement correct?

Solution: A Dockerfile stores the Docker daemon's configuration options.

Options:

A.

Yes

B.

No

Buy Now
Questions 49

Is this an advantage of multi-stage builds?

Solution: faster image builds by allowing parallel execution of Docker builds

Options:

A.

Yes

B.

No

Buy Now
Questions 50

In the context of a swarm mode cluster, does this describe a node?

Solution. an instance of the Docker CLI connected to the swarm

Options:

A.

Yes

B.

No

Buy Now
Questions 51

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?

Solution. environment variables

Options:

A.

Yes

B.

No

Buy Now
Questions 52

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53 -udp dns-cache’

Options:

A.

Yes

B.

No

Buy Now
Questions 53

Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Solution: accounting and limiting of resources

Options:

A.

Yes

B.

No

Buy Now
Questions 54

Will this action upgrade Docker Engine CE to Docker Engine EE?

Solution: Delete '/var/lib/docker' directory.

Options:

A.

Yes

B.

No

Buy Now
Exam Code: DCA
Exam Name: Docker Certified Associate (DCA) Exam
Last Update: Apr 30, 2024
Questions: 183

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now DCA testing engine

PDF (Q&A)

$35  $99.99
buy now DCA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 May 2024