A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.
Can this be used to schedule containers to meet the security policy requirements?
Solution: node taints
A. Yes
B. No
Seven managers are in a swarm cluster.
Is this how should they be distributed across three datacenters or availability zones?
Solution: 3-2-2
A. Yes
B. No
What service mode is used to deploy a single task of a service to each node?
A. replicated
B. spread
C. universal
D. distributed
E. global
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object.
Does this command display it?
Solution: kubectl describe deployment api
A. Yes
B. No
Will this command mount the host's '/data' directory to the ubuntu container in read-only mode? Solution: 'docker run --add-volume /data /mydata -read-only ubuntu'
A. Yes
B. No
You created a new service named 'http' and discover it is not registering as healthy. Will this command enable you to view the list of historical tasks for this service? Solution: 'docker inspect http'
A. Yes
B. No
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry? Solution: Delete the image and run garbage collection on the Docker Trusted Registry.
A. Yes
B. No
Will this command display a list of volumes for a specific container? Solution: docker container logs nginx --volumes'
A. Yes
B. No
During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.
Will this strategy successfully accomplish this?
Solution: Set containers. Mounts. hostBinding: /data in the container's specification.
A. Yes
B. No
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?
Solution: Set and export the IGNORE_TLS environment variable on the command line.
A. Yes
B. No