Docker Certified Associate 2020 - Practice Exams - NEW Set 6

Which of the following commands will ensure that overlay traffic between service tasks is encrypted?


Options are :

  • docker service create --network --encrypted
  • docker network create -d overlay --secure
  • docker service create --network --secure
  • docker network create -d overlay -o encrypted=true (Correct)

Answer :docker network create -d overlay -o encrypted=true

Which of the following modes can be used for service discovery of a Docker swarm service ? (Select all that apply)


Options are :

  • Network Address Translation(NAT) with --endpoint-mode nat
  • Virtual IP (VIP) with --endpoint-mode vip (Correct)
  • Ingress with --endpoint-mode ingress
  • Overlay with --endpoint-mode overlay
  • DNS Round-Robin with --endpoint-mode dnsrr (Correct)

Answer :Virtual IP (VIP) with --endpoint-mode vip DNS Round-Robin with --endpoint-mode dnsrr

Docker Certified Associate (DCA) Practice Exams Set 7

What is the endpoint that we can use to check the health of a single UCP manager node? 


Options are :

  • https:///_ping (Correct)
  • https:///_health
  • https:///_status
  • https:///_heartbeat

Answer :https:///_ping

What is the docker command to display detailed information on one or more networks?


Options are :

  • docker network display
  • docker network inspect (Correct)
  • docker inspect network
  • docker network status

Answer :docker network inspect

What does 'docker image rm' command do? 


Options are :

  • Shows layers of an image
  • Remove one or more images (Correct)
  • Remove dangling images
  • Display detailed information on one or more images

Answer :Remove one or more images

Docker Certified Associate (DCA) Practice Exams Set 6

How do you configure Docker engine to use a registry that is not configured with TLS certificates from a trusted CA?


Options are :

  • Pass the '--insecure-registry' flag to the daemon at run time. (Correct)
  • Set and export the IGNORE_TLS environment variable on the command line.
  • Set IGNORE_TLS in the 'daemon.json' configuration file.
  • Set INSECURE_REGISTRY in the '/etc/docker/default' configuration file.

Answer :Pass the '--insecure-registry' flag to the daemon at run time.

What command remove dangling images and all unused images ?


Options are :

  • docker image prune -a (Correct)
  • docker image rm -a
  • docker image prune
  • docker image rm --all

Answer :docker image prune -a

Which of the following is correct about the result of the command 'docker run --name=nginx -d -v nginxvol:/var/log/nginx nginx:latest ' ?


Options are :

  • Starts an nginx container and mounts the volume /var/log/nginx from the container nginx-vol.
  • Starts an nginx container and mounts the volume nginx-vol from the Docker host and expose host files inside the container at the specified path .
  • Starts an nginx container and populates the new volume nginx-vol, with the contents of the containerís /var/log/nginx directory, which is where Nginx logs content. (Correct)
  • Starts an nginx container and populates the new volume nginx-vol, with the contents of the Docker host /var/log/nginx directory, which is where Nginx logs content.

Answer :Starts an nginx container and populates the new volume nginx-vol, with the contents of the containerís /var/log/nginx directory, which is where Nginx logs content.

Docker Certified Associate (DCA) Practice Exams Set 23

Which of the following is required to install Docker EE from a package repository?


Options are :

  • B. License key obtained from Docker Store
  • A. License key obtained from Docker Hub
  • D. Repository URL obtained from Docker Store
  • C. Repository URL obtained from Docker Hub (Correct)

Answer :C. Repository URL obtained from Docker Hub

Which of the following commands is used to display system-wide Docker configuration on a host?


Options are :

  • docker info (Correct)
  • docker system
  • docker status
  • docker config ps

Answer :docker info

Which statement is true?   


Options are :

  • CMD is used to run the software is the image along with any arguments
  • ENTRYPOINT cannot be used in conjuction with CMD
  • CMD shell format uses this form ["param", param", "param"] (Correct)
  • ENTRYPOINT cannot be overriden in the "docker container run" command

Answer :CMD shell format uses this form ["param", param", "param"]

Docker Certified Associate (DCA) Practice Exams Set 2

What is the docker command to find the current logging driver for a running container?


Options are :

  • docker info (Correct)
  • docker status
  • A. docker status
  • docker config

Answer :docker info

You have just executed 'docker swarm leave' on a node. What command can be run on the same node to confirm it has left the cluster?


Options are :

  • docker system info (Correct)
  • docker node status
  • docker node ls
  • docker system status

Answer :docker system info

Which network driver type is best when the network stack should not be isolated from the Docker host, but you want other aspects of the container to be isolated?


Options are :

  • Macvlan networks
  • Host networks (Correct)
  • User-defined bridge networks
  • Overlay Networks

Answer :Host networks

Docker Certified Associate (DCA) Practice Exams Set 4

An image is used to deploy an application to multiple different environments (development, tests and production) , and these environments uses different certificates and network ports. Which of the following would be the best practice to deploy this application ?


Options are :

  • Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates
  • Create a Dockerfile for each environment, specifying ports and ENV variables for certificates.
  • Create a config file for each environment. (Correct)
  • Create images that contain the specific configuration for every environment.

Answer :Create a config file for each environment.

Docker Certified Associate (DCA) Practice Tests Set 11

Docker Trusted Registry (DTR) has to be installed on UCP. True or False ?


Options are :

  • True (Correct)
  • False

Answer :True

What is the difference between a resource limit and a resource reservation ?


Options are :

  • A resource limit is a hard limit for your service, while a reservation is hard limit for containers.
  • A resource limit is a soft limit for your service, while a reservation is hard limit and the docker engine engine will do its best to keep your service at the limit.
  • A resource limit is hard limit for your service, while a reservation is a soft limit and it is used to find a host with adequate resources for scheduling. (Correct)
  • There is no difference. A resource limit and a resource reservation can be used for the same purpose.

Answer :A resource limit is hard limit for your service, while a reservation is a soft limit and it is used to find a host with adequate resources for scheduling.

Which of the following is correct about minimum number of manager nodes to maintain a majority quorum ?


Options are :

  • A seven-manager Swarm with quorum of four manager nodes availables. (Correct)
  • A five-manager Swarm with quorum of two manager nodes availables .
  • A three-manager with quorum of one manager node available .
  • A nine-manager with quorum of four manager node available .

Answer :A seven-manager Swarm with quorum of four manager nodes availables.

Docker Certified Associate (DCA) Practice Exams Set 20

In the output below, what do the IDs next to the "Pull complete" message indicate?



Options are :

  • Configuration files download has completed.
  • Binary image files download has completed.
  • Image files download has completed.
  • Image layers download has completed. (Correct)

Answer :Image layers download has completed.

Which commands will show the image used to create the nginx pods below ?


Options are :

  • kubectl get pods -o all ;
  • kubectl get pods -o wide; (Correct)
  • kubectl describe pods -a
  • kubectl describe pods nginx (Correct)
  • kubectl describe pods

Answer :kubectl get pods -o wide; kubectl describe pods nginx

Why does multi-stage build are useful for developers ?


Options are :

  • Multistage builds are useful to anyone who has struggled to optimize Dockerfiles while keeping them easy to read and maintain. (Correct)
  • Multi-stage builds give the benefits of the builder pattern without the hassle of maintaining three separate files (Correct)
  • It provides better caching when building Docker images
  • Multistage builds are useful to improve performance of the base image.

Answer :Multistage builds are useful to anyone who has struggled to optimize Dockerfiles while keeping them easy to read and maintain. Multi-stage builds give the benefits of the builder pattern without the hassle of maintaining three separate files

Docker Certified Associate (DCA) Practice Exams Set 13

Services might remain in a pending state in which of the following scenarios? (Select all that apply)


Options are :

  • If a node is changed from global to replicated mode without set number of replicas.
  • If all nodes are paused or drained, and you create a service, it is pending until a node becomes available. (Correct)
  • If placement constraints is imposed on the service, but the constraints may not be able to be honored at a given time. (Correct)
  • If a specific amount of memory was reserved for a service, and there is no corresponding node in the swarm which has the required amount of memory, then, the service remains in a pending state until a node is available which can run its tasks. (Correct)

Answer :If all nodes are paused or drained, and you create a service, it is pending until a node becomes available. If placement constraints is imposed on the service, but the constraints may not be able to be honored at a given time. If a specific amount of memory was reserved for a service, and there is no corresponding node in the swarm which has the required amount of memory, then, the service remains in a pending state until a node is available which can run its tasks.

Which handler is used by Kubelet to perform TCP check against the Container's IP address on a specified port ?


Options are :

  • IPGetAction
  • IPSocketAction
  • ExecDocketAction
  • TCPSocketAction (Correct)

Answer :TCPSocketAction

Which command is used to see details about the service running in the swarm AND provide the output in easily readable format?


Options are :

  • docker service inspect --pretty (Correct)
  • docker service inspect --printformat
  • docker service inspect
  • docker service inspect --easyread

Answer :docker service inspect --pretty

Docker Certified Associate (DCA) Practice Exams Set 7

If you want to create a services but prevent it from being deployed you should?


Options are :

  • Configure it in such a way that it remains in pending
  • Set flag '--availability' to 'pause'
  • Scale service to 0 (Correct)
  • Pass flag '--noschedule' when create a service

Answer :Scale service to 0

Which of the following are types of namespaces used by Docker ? (Select all that apply)


Options are :

  • Network (Correct)
  • Security
  • IDC
  • Process ID (Correct)

Answer :Network Process ID

From whom does the container inherit the default DNS settings?


Options are :

  • base image
  • docker host
  • docker daemon (Correct)
  • docker registry

Answer :docker daemon

Docker Certified Associate (DCA) Practice Exams Set 1

Which mechanism is used to exclude files and directories from the context that docker CLI uses to create an IMAGE ?


Options are :

  • .dockerignore file (Correct)
  • EXCLUDE instruction
  • IGNORE instruction
  • .dockerexclude file

Answer :.dockerignore file

When seven managers are in a swarm cluster how would they be distributed across three datacenters or availability zones?


Options are :

  • 3-3-1
  • 5-1-1
  • 3-2-2 (Correct)
  • 4-2-1

Answer :3-2-2

Docker security scan can be started only by users who have write access . True or false?


Options are :

  • False
  • True (Correct)

Answer :True

Docker Certified Associate (DCA) Practice Exams Set 19

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions