DCA | What Simulation DCA Dumps Questions Is

Want to know Passleader DCA Exam practice test features? Want to lear more about Docker Docker Certified Associate (DCA) Exam certification experience? Study Vivid Docker DCA answers to Renovate DCA questions at Passleader. Gat a success with an absolute guarantee to pass Docker DCA (Docker Certified Associate (DCA) Exam) test on your first attempt.

Free DCA Demo Online For Docker Certifitcation:

NEW QUESTION 1
What is the difference between the ADD and COPY dockerfile instructions? (choosen 2)

  • A. ADD supports compression format handling while COPY does not.
  • B. COPY supports regular expression handling while ADD does not.
  • C. COPY supports compression format handling while ADD does not.
  • D. ADD support remote URL handling while COPY does not.
  • E. ADD supports regular expression handling while COPY does not.

Answer: DE

NEW QUESTION 2
Which of the following commands starts a Redis container and configures it to always restart unless it is explicitly stopped or Docker is restarted?

  • A. 'docker run -d --restart-policy unless-stopped redis'
  • B. 'docker run -d --restart omit-stopped redis'
  • C. 'docker run -d --restart unless-stopped redis'
  • D. 'docker run -d --failure omit-stopped redis'

Answer: C

NEW QUESTION 3
Which of the following statements is true about secrets?

  • A. Secrets can be created from any node in the cluster.
  • B. Secrets can be modified after they are created.
  • C. Secret are stored unencrypted on manager nodes.
  • D. Secrets can be created using standard input (STDIN) and a file.

Answer: D

NEW QUESTION 4
Which of the following is required to install Docker EE from a package repository?

  • A. Repository URL obtained from Docker Store
  • B. License key obtained from Docker Store
  • C. Repository URL obtained from Docker Hub
  • D. License key obtained from Docker Hub

Answer: A

NEW QUESTION 5
Following the principle of least privilege, which of the following methods can be used to securely grnt access to the specific user to communicate to a Docker engine? (Choose two.)

  • A. Utilize the '--host 0.0.0.0:2375' option to the Docker daemon to listen on port 2375 over TCP on all interfaces
  • B. Utilize openssl to create TLS client and server certificates, configuring the Docker engine to use with mutual TLS over TCP.
  • C. Utilize the '--host 127.0.0.1:2375' option to the Docker daemon to listen on port 2375 over TCP on localhost
  • D. Give the user root access to the server to allow them to run Docker commands as root.
  • E. Add the user to the 'docker' group on the server or specify the grouè with the '--group' Docker daemon option.

Answer: BE

NEW QUESTION 6
In Docker Trusted Registry, how would a user prevent an image, for example 'nginx:latest' from being overwritten by another user with push access to the repository?

  • A. Tag the image with 'nginx:immutable'
  • B. Remove push access from all other users.
  • C. Use the DTR web UI to make the tag immutable.
  • D. Keep a backup copy of the image on another repository.

Answer: C

NEW QUESTION 7
Wha is the purpose of Docker Content Trust?

  • A. Signing and verification of image tags
  • B. Enabling mutual TLS between the Docker client and server
  • C. Docker registry TLS verification and encryption
  • D. Indicating an image on Docker Hub is an official image

Answer: A

NEW QUESTION 8
A container named "analytics" that stores results in a volume called "data" was created. docker run -d --name=analytics -v data:/data app1
How are the results accessed in "data" with another container called "app2"?

  • A. docker run -d --name=reports --volume=data app2
  • B. docker run -d --name=reports --volumes-from=analytics app2
  • C. docker run -d --name=reports --volume=app1 app2
  • D. docker run -d --name=reports --mount=app1 app2

Answer: B

NEW QUESTION 9
How do you configure Docker engine to use a registry that is not configured with TLS certificates from a trusted CA?

  • A. Set IGNORE_TLS in the 'daemon.json' configuration file.
  • B. Set and export the IGNORE_TLS environment variable on the command line
  • C. Set INSECURE_REGISTRY in the '/etc/docker/default' configuration file
  • D. Pass the '--insecure.-registry' flag to the daemon at run time

Answer: D

NEW QUESTION 10
What service mode is used to deploy a single task of a service to each node?

  • A. replicated
  • B. spread
  • C. universal
  • D. distributed
  • E. global

Answer: E

NEW QUESTION 11
Which one of the following commands will result in the volume being removed automatically once the container
has exited?

  • A. 'docker run --del -v /foo busybox'
  • B. 'docker run --read-only -v /foo busybox'
  • C. 'docker run --rm -v /foo busybox'
  • D. 'docker run --remove -v /foo busybox'

Answer: C

NEW QUESTION 12
What is the docker command to find the current logging driver for a running container?

  • A. docker stats
  • B. docker info
  • C. docker config
  • D. docker inspect

Answer: D

NEW QUESTION 13
What is the docker command to setup a swarm?

  • A. docker swarm init
  • B. docker swarm create
  • C. docker init swarm
  • D. docker create swarm

Answer: A

Explanation:
Explanation https://docs.docker.com/engine/reference/commandline/swarm/

NEW QUESTION 14
Which command interactively monitors all container activity in the Docker engine?

  • A. docker system logs
  • B. docker system events
  • C. docker container events
  • D. docker container logs

Answer: B

NEW QUESTION 15
What is used by the kernel to Isolate resources when running Docker containers?

  • A. Namespaces
  • B. Overlay networks
  • C. Volumes
  • D. Control groups (also know as cgroups)

Answer: D

NEW QUESTION 16
Which of these swarm manager configurations will cause the cluster to be in a lost quorum state?

  • A. 4 managers of which 2 are healthy
  • B. 1 manager of which 1 is healthy
  • C. 3 managers of which 2 are healthy
  • D. 5 managers of which 3 are healthy

Answer: A

NEW QUESTION 17
Which of the following modes can be used for service discovery of a Docker swarm service (Pick 2 correct answers)

  • A. Virtual IP (VIP) with --endpoint-mode vip
  • B. Overlay with --endpoint-mode overlay
  • C. DNS Round-Robin with --endpoint-mode dnsrr
  • D. Ingress with --endpoint-mode ingress
  • E. Network Address Translation(NAT) with --endpoint-mode nat

Answer: AC

NEW QUESTION 18
A service 'wordpress' is running using a password string to connect to a non-Dockerized database service. The password string is passed into the 'wordpress' service as a Docker secret. Per security policy, the password on the database was changed. Identity the correct sequence of steps to rotate the secret from the old password to the new password.

  • A. Create a new docker secret with the new passwor
  • B. Trigger a rolling secret update by using the 'docker secret update' command
  • C. Trigger an update to the service by using 'docker service update --secret=<new password>'
  • D. Create a new docker secret with the new passwor
  • E. Remove the existing service using 'docker service rm'. Start a new service with the new secret using "--secret=<new password>"
  • F. Create a new docker secret with a new passwor
  • G. Trigger a rolling update of the "wordpress" service, by using "--secret-rm" & "--secret-add" to remove the old secret and add the updated secret.

Answer: D

NEW QUESTION 19
You have deployed a service to swarm. Which command uses the Docker CLI to set the number of tasks of the services to 5? (choose 2)

  • A. 'docker service update --replicas=5 <service-id>'
  • B. 'docker replica update <service-id>=5'
  • C. 'docker update service <service-id>=5'
  • D. 'docker service replicas <service-id>=5'
  • E. 'docker service scale <service-id> = 5''

Answer: AE

NEW QUESTION 20
Which one of the following commands will show a list of volumes for a specific container?

  • A. 'docker container logs nginx --volumes'
  • B. 'docker container inspect nginx'
  • C. 'docker volume inspect nginx'
  • D. 'docker volume logs nginx --containers'

Answer: B

NEW QUESTION 21
What is one way of directly transferring a Docker Image from one Docker host in another?

  • A. 'docker push' the image to the IP address of the target host.
  • B. 'docker commit' to save the image outside of the Docker filesyste
  • C. Then transfer the file over to the target host and 'docker start' to start the container again.
  • D. There is no way of directly transferring Docker images between host
  • E. A Docker Registry must be used ad an intermediary.
  • F. 'docker save' the image to save it as TAR file and copy it over to the target hos
  • G. Then use 'docker load' to un-TAR the image back as a Docker image.

Answer: D

NEW QUESTION 22
......

P.S. Easily pass DCA Exam with 55 Q&As Certleader Dumps & pdf Version, Welcome to Download the Newest Certleader DCA Dumps: https://www.certleader.com/DCA-dumps.html (55 New Questions)