FREE Docker Certified Associate MCQ Question and Answers
Which of the following commands can automatically add the extracted content into the image and accept a tar file as an argument?
The functions of the Dockerfile commands COPY and ADD are comparable. They enable you to add files to a Docker image from a specific place.
COPY requires a source and a destination. Only local files or directories from your host—the computer creating the Docker image—can be copied into the actual Docker image.
You can accomplish that with ADD as well, but it also supports two additional sources. First, rather than using a local file or directory, you can use a URL. The second option is to directly extract a tar file from the source into the destination.
What steps should a system administrator take in the right order to create a backup strategy for Docker Enterprise Edition?
Since all of the masters in the cluster have access to the cluster's entire state thanks to distributed storage, you only take a backup of one master.
The manager logs on the Docker swarm manager node contains information about the cluster as a whole. Configurations, access controls, certificates, metrics data, etc. are all stored by UCP.
The number of services running and where they are located are managed by swarm; UCP does not save this information.
DTR, on the other hand, just keeps track of the photos and a few additional configurations that are pertinent to them.
Docker suggests performing backups in the order listed above for the best recovery outcomes.
For instance, if UCP is backed up before the swarm, we will lose some swarm metrics information that was gathered during the time of UCP backup.
As opposed to this, if we back up Swarm first and then UCP, we won't miss any metrics.
With Docker Content Trust, you can use _________ to confirm the publisher and integrity of any data you receive from a registry over any channel.
The use of digital signatures is appropriate since they may be used to confirm the reliability of both publishers and material utilizing the public private key encryption architecture.
A container shouldn't use more memory than is allowed; this is something you want to make sure of. Which of the following will Docker employ by default to accomplish that?
Cgroups provide a mechanism for grouping processes and managing system resources such as CPU, memory, disk I/O, network bandwidth, and more.
With cgroups, you can assign resource limits, prioritize resources, and control resource usage for individual processes or groups of processes. This helps in managing resource utilization and ensuring fair allocation among different applications or containers running on a system.
What lvm mode should a host in production use when using the devicemapper as a storage driver?
It is intended for usage in production to employ direct-lvm mode.
Which of the subsequent patterns would prevent any Python byte-code files from being copied during the building of a Docker image?
Docker provides a special wildcard string ** that matches any number of folders in addition to Go's filepath. Match rules (including zero). For instance, **/*.go will exclude all files with the.go extension that are present in any directory, including the build context's root.
Which of the following statements regarding secrets is FALSE?
Swarm services and standalone containers have access to secrets, hence the assertion is untrue. Only swarm services and not solo containers are permitted to use secrets.