- Home
- Docker
- DCA Dumps
Examcollection DCA Questions are updated and all DCA answers are verified by experts. Once you have completely prepared with our DCA exam prep kits you will be ready for the real DCA exam without a problem. We have Updated Docker DCA dumps study guide. PASSED DCA First attempt! Here What I Did.
Online Docker DCA free dumps demo Below:
NEW QUESTION 1
A host machine has four CPUs available and two running containers. The sysadmin would like to assign two CPUs to each container.
Which of the following commands achieves this?
- A. Set the '--cpuset-cpu's flag to '1.3' on one container and '2.4' on the other container.
- B. Set the '--cpuset-cpus' flag to '.5' on both containers
- C. Set the '--cpuset-cpus' flag of the 'dockerd' process to the value 'even-spread'
- D. Set the '--cpu-quota' flag to '1.3' on one container and '2,4' on the other container.
Answer: B
NEW QUESTION 2
Which of the following is NOT backed up when performing a Docker Trusted backup operation?
- A. Access control to repos and images
- B. Repository metadata
- C. Image blobs
- D. DTR configurations
Answer: C
NEW QUESTION 3
What is used by the kernel to Isolate resources when running Docker containers?
- A. Namespaces
- B. Overlay networks
- C. Volumes
- D. Control groups (also know as cgroups)
Answer: D
NEW QUESTION 4
The following health check exists in a Dockerfile: 'HEALTCHECK
CMD curl --fail http://localhost/health || exit 1 '
Which of the following describes its purpose?
- A. Defines the action taken when container health fails, which in this case will kill the container with exit status 1
- B. Defines the health check endpoint on the localhost interface for external monitoring tools to monitor the health of the docker engine.
- C. Defines the health check endpoint on the local host interface for containers to monitor the health of the docker engine.
- D. Defines the health check for the containerized application so that the application health can be monitored by the Docker engine
Answer: A
NEW QUESTION 5
A container named "analytics" that stores results in a volume called "data" was created. docker run -d --name=analytics -v data:/data app1
How are the results accessed in "data" with another container called "app2"?
- A. docker run -d --name=reports --volume=data app2
- B. docker run -d --name=reports --volumes-from=analytics app2
- C. docker run -d --name=reports --volume=app1 app2
- D. docker run -d --name=reports --mount=app1 app2
Answer: B
NEW QUESTION 6
Which command interactively monitors all container activity in the Docker engine?
- A. docker system logs
- B. docker system events
- C. docker container events
- D. docker container logs
Answer: B
NEW QUESTION 7
What is the docker command to setup a swarm?
- A. docker swarm init
- B. docker swarm create
- C. docker init swarm
- D. docker create swarm
Answer: A
Explanation:
Explanation https://docs.docker.com/engine/reference/commandline/swarm/
NEW QUESTION 8
What is the purpose of multi-stage builds?
- A. Better logical separation of Dockerfile instructions for better readability
- B. Optimizing images by copying artifacts selectively from previous stages
- C. Better caching when building Docker images
- D. Faster image builds by allowing parallel execution of Docker builds
Answer: B
NEW QUESTION 9
A user is having problems running Docker. Which of the following will start Docker in debug mode?
- A. Set the debug key to true in the 'daemon.json' file.
- B. Start the 'dockerd' process manually with the '--logging' flag set to debug
- C. Set the logging key to debug in the 'daemon.json' file.
- D. Start the 'dockerd' process manually with the '--raw-logs' flag set to debug
Answer: A
NEW QUESTION 10
Which set of commands can identify the publishd port(s) for a container? (Choose 1.)
- A. 'docker port inspect', 'docker container inspect'
- B. 'docker container inspect', docker port'
- C. 'docker info','docker network inspect'
- D. 'docker network inspect','docker port'
Answer: B
NEW QUESTION 11
You have created a Docker bridge network on a host with three containers attached, how do you make this containers accessible outside of the host?
- A. Use network attach to access the containers on the bridge network
- B. Use either EXPOSE or --publish to access the containers on the bridge network
- C. Use network connect to access the containers on the bridge network
- D. Use --link to access the containers on the bridge network Correct
Answer: B
NEW QUESTION 12
Which of the following is true about using the '-P' option when creating a new container?
- A. Docker binds each exposed container port to a random port on all the host's interface
- B. Docker gives extended privileges to the container.
- C. Docker binds each exposed container port to a random port on a specified host interface
- D. Docker binds each exposed container port with the same port on the host
Answer: AExplanationControllare
NEW QUESTION 13
A docker service 'web' is running with a scale factor of 1 (replicas = 1). Bob intends to use the command 'docker service update --replicas=3 web'. Alice intends to use the command 'docker service scale web=3'.
How do the outcomes oft these two commands differ?
- A. Bob's command results in an erro
- B. Alice's command updates the number of replicas of the 'web' service to 3.
- C. Bob's command only updates the service definition, but no new replicas are starte
- D. Alice's command results in the actual scaling up of the 'web' service.
- E. Bob's command updates the number of replicas of the 'web' service to 3. Alice's command results in an error.
- F. Both Bob's and Alice's commands result in exactly the same outcome, which is 3 instances of the 'web' service.
Answer: D
NEW QUESTION 14
Which statement is true about DTR garbage collection?
- A. Garbage collection removes unreferenced image layers from DTR's backend storage.
- B. Garbage collection removes exited containers from cluster nodes.
- C. Garbage collection removes DTR images that are older than a configurable of days
- D. Garbage collection removes unused volumes from cluster nodes
Answer: A
NEW QUESTION 15
Which of the following modes can be used for service discovery of a Docker swarm service (Pick 2 correct answers)
- A. Virtual IP (VIP) with --endpoint-mode vip
- B. Overlay with --endpoint-mode overlay
- C. DNS Round-Robin with --endpoint-mode dnsrr
- D. Ingress with --endpoint-mode ingress
- E. Network Address Translation(NAT) with --endpoint-mode nat
Answer: AC
NEW QUESTION 16
Following the principle of least privilege, which of the following methods can be used to securely grnt access to the specific user to communicate to a Docker engine? (Choose two.)
- A. Utilize the '--host 0.0.0.0:2375' option to the Docker daemon to listen on port 2375 over TCP on all interfaces
- B. Utilize openssl to create TLS client and server certificates, configuring the Docker engine to use with mutual TLS over TCP.
- C. Utilize the '--host 127.0.0.1:2375' option to the Docker daemon to listen on port 2375 over TCP on localhost
- D. Give the user root access to the server to allow them to run Docker commands as root.
- E. Add the user to the 'docker' group on the server or specify the grouè with the '--group' Docker daemon option.
Answer: BE
NEW QUESTION 17
Which flag for a service would allow a container to consume more than 2 GB of memory only when there is no memory contention but would also prevent a container from consuming more than 4GB of memory, in any case?
- A. --limit-memory 2GB --reserve-memory 4GB
- B. --limit-memory 4GB --reserve-memory 2GB
- C. --memory-swap 2GB --limit-memory 4GB
- D. --memory-swap 4GB --limit-memory 2GB
Answer: C
NEW QUESTION 18
Which of the following commands will ensure that overlay traffic between service tasks is encrypted?
- A. docker service create --network <network-name> --secure <service-name>
- B. docker network create -d overlay --secure <network-name>
- C. docker network create -d overlay -o encrypted=true <network-name>
- D. docker service create --network <network-name> --encrypted <service-name>
Answer: C
NEW QUESTION 19
Which of the following commands will create a swarm service which only listens on port 53 using the UDP protocol?
- A. docker service create --name dns-cache -p 53:53/udp dns-cache
- B. docker service create --name dns-cache -p 53:53 --service udp dns-cache
- C. docker service create --name dns-cache -p 53:53 ..constraint networking.protocol.udp=true dns-cache
- D. docker service create --name dns-cache -p 53:53 --udp dns-cache
Answer: A
NEW QUESTION 20
Which of the following statements is true about secrets?
- A. Secrets can be created from any node in the cluster.
- B. Secrets can be modified after they are created.
- C. Secret are stored unencrypted on manager nodes.
- D. Secrets can be created using standard input (STDIN) and a file.
Answer: D
NEW QUESTION 21
Which one of the following commands will show a list of volumes for a specific container?
- A. 'docker container logs nginx --volumes'
- B. 'docker container inspect nginx'
- C. 'docker volume inspect nginx'
- D. 'docker volume logs nginx --containers'
Answer: B
NEW QUESTION 22
Which of the following constitutes a production-ready devicemapper configuration for the Docker engine?
- A. Create a volume group in devicemapper and utilize the '--dm.thinpooldev' Docker daemon option, specifying the volume group
- B. Format a partition with xfs and mount it at '/var/lib/docker'
- C. Utilize the '--storage-opt dm.directlvm_device' Docker daemon option, specifying a block device
- D. Nothing, devicemapper comes ready for production usage out of the box
Answer: C
Explanation:
Explanation
NEW QUESTION 23
After creating a new service named 'http', you notice that the new service is not registering as healthy. How do you view the list of historical tasks for that service by using the command line?
- A. 'docker inspect http'
- B. 'docker service inspect http'
- C. 'docker service ps http'
- D. 'docker ps http'
Answer: C
NEW QUESTION 24
An application image runs in multiple environments, and each environment uses different certificates and ports, what is the best practice to deploy the containers?
- A. Create a Dockerfile for each environment, specifying ports and ENV variables for certificates.
- B. Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates.
- C. Create images that contain the specific configuration for every environment.
- D. Create a config file for each environment.
Answer: D
NEW QUESTION 25
Which of the following is supported by control groups?
- A. Manage certificates
- B. Collect net
- C. Limit CPU usage within a container
- D. Isolate processes in a container
Answer: C
P.S. Easily pass DCA Exam with 55 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net DCA Dumps: https://www.downloadfreepdf.net/DCA-pdf-download.html (55 New Questions)