Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

DCA Docker Certified Associate (DCA) Exam Questions and Answers

Questions 4

Will this command ensure that overlay traffic between service tasks is encrypted?

Solution.docker network create -d overlay --secure

Options:

A.

Yes

B.

No

Buy Now
Questions 5

Is this statement correct?

Solution.A Dockerfile stores persistent data between deployments of a container

Options:

A.

Yes

B.

No

Buy Now
Questions 6

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Add all the resources to the default namespace.

Options:

A.

Yes

B.

No

Buy Now
Questions 7

Your organization has a centralized logging solution, such as Splunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution: docker logs

Options:

A.

Yes

B.

No

Buy Now
Questions 8

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: namespaces

Options:

A.

Yes

B.

No

Buy Now
Questions 9

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Solution: 'kubectl get pods --all-namespaces -label env=development'

Options:

A.

Yes

B.

No

Buy Now
Questions 10

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: cgroups

Options:

A.

Yes

B.

No

Buy Now
Questions 11

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A persistentVolumeClaim is created that specifies a pre-defined storageClass.

Options:

A.

Yes

B.

No

Buy Now
Questions 12

Which networking drivers allow you to enable multi-host network connectivity

between containers?

Options:

A.

macvlan, ipvlan, and overlay

B.

bridge, user-defined, host

C.

host, macvlan, overlay, user-defined

D.

bridge, macvlan, ipvlan, overlay

Buy Now
Questions 13

Does this command display all the pods in the cluster that are labeled as env; development'?

Solution. ‘kubectl gel pods --all-namespaces -I 'env in (development)''

Options:

A.

Yes

B.

No

Buy Now
Questions 14

One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times. Is this the action taken by the orchestrator to fix the unhealthy container?

Solution: Kubernetes automatically triggers a user-defined script to attempt to fix the unhealthy container.

Options:

A.

Yes

B.

No

Buy Now
Questions 15

In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository?

Solution: Keep a backup copy of the image on another repository.

Options:

A.

Yes

B.

No

Buy Now
Questions 16

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: node affinities

Options:

A.

Yes

B.

No

Buy Now
Questions 17

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?

Solution: kubectl events deployment api

Options:

A.

Yes

B.

No

Buy Now
Questions 18

The Kubernetes yaml shown below describes a clusterIP service.

DCA Question 18

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of this service on port 80 will be routed to port 8080 in a random pod with the label app:

nginx.

Options:

A.

Yes

B.

No

Buy Now
Questions 19

Will this command mount the host's '/data' directory to the ubuntu container in read-only mode?

Solution: 'docker run --add-volume /data /mydata -read-only ubuntu'

Options:

A.

Yes

B.

No

Buy Now
Questions 20

The following Docker Compose file is deployed as a stack:

DCA Question 20

Is this statement correct about this health check definition?

Solution: Health checks test for app health five seconds apart. If the test fails, the container will be restarted three times before it gets rescheduled.

Options:

A.

Yes

B.

No

Buy Now
Questions 21

Will a DTR security scan detect this?

Solution.image configuration poor practices, such as exposed ports or inclusion of compilers in production images

Options:

A.

Yes

B.

No

Buy Now
Questions 22

An application image runs in multiple environments, with each environment using different certificates and ports.

Is this a way to provision configuration to containers at runtime?

Solution: Create a Dockerfile for each environment, specifying ports and ENV variables for certificates.

Options:

A.

Yes

B.

No

Buy Now
Questions 23

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53/udp dns-cache"

Options:

A.

Yes

B.

No

Buy Now
Questions 24

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution.capabilities

Options:

A.

Yes

B.

No

Buy Now
Questions 25

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?

Solution.label constraints

Options:

A.

Yes

B.

No

Buy Now
Questions 26

Will This command list all nodes in a swarm cluster from the command line?

Solution. ‘docker swarm nodes'

Options:

A.

Yes

B.

No

Buy Now
Questions 27

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Manually delete all layers used by the image on the disk from the Docker Trusted Registry.

Options:

A.

Yes

B.

No

Buy Now
Questions 28

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Create one namespace for each application and add all the resources to it.

Options:

A.

Yes

B.

No

Buy Now
Questions 29

Is this the purpose of Docker Content Trust?

Solution.Indicate an image on Docker Hub is an official image.

Options:

A.

Yes

B.

No

Buy Now
Questions 30

The Kubernetes yaml shown below describes a networkPolicy.

DCA Question 30

Will the networkPolicy BLOCK this trafftc?

Solution. a request issued from a pod bearing only the tier: frontend label, to a pod bearing the tier: backend label

Options:

A.

Yes

B.

No

Buy Now
Questions 31

Your organization has a centralized logging solution, such as Sptunk.

Will this configure a Docker container to export container logs to the logging solution?

Solution.docker system events- -filter splunk

Options:

A.

Yes

B.

No

Buy Now
Questions 32

Will this command list all nodes in a swarm cluster from the command line?

Solution. ‘docker inspect nodes

Options:

A.

Yes

B.

No

Buy Now
Questions 33

Will this configuration achieve fault tolerance for managers in a swarm?

Solution: one manager node for two worker nodes

Options:

A.

Yes

B.

No

Buy Now
Questions 34

Is this a type of Linux kernel namespace that provides container isolation?

Solution: Network

Options:

A.

Yes

B.

No

Buy Now
Questions 35

Is this an advantage of multi-stage builds?

Solution: better caching when building Docker images

Options:

A.

Yes

B.

No

Buy Now
Questions 36

You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this?

Solution: Turn the configuration file into a configMap object, use it to populate a volume associated with the pod, and mount that file from the volume to the appropriate container and path.

Options:

A.

Yes

B.

No

Buy Now
Questions 37

Will this configuration achieve fault tolerance for managers in a swarm?

Solution: only two managers, one active and one passive.

Options:

A.

Yes

B.

No

Buy Now
Questions 38

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: seccomp

Options:

A.

Yes

B.

No

Buy Now
Questions 39

Is this a type of Linux kernel namespace that provides container isolation?

Solution: Storage

Options:

A.

Yes

B.

No

Buy Now
Questions 40

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution: ‘docker service create -name dns-cache -p 53:53 -service udp dns-cache'

Options:

A.

Yes

B.

No

Buy Now
Questions 41

Is this a type of Linux kernel namespace that provides container isolation?

Solution.Process ID

Options:

A.

Yes

B.

No

Buy Now
Questions 42

Some Docker images take time to build through a Continuous Integration environment. You want to speed up builds and take advantage of build caching.

Where should the most frequently changed part of a Docker image be placed in a Dockerfile?

Options:

A.

at the top of the Dockerfile

B.

after the FROM directive

C.

at the bottom of the Dockerfile

D.

in the ENTRYPOINT directive

Buy Now
Questions 43

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution.pid

Options:

A.

Yes

B.

No

Buy Now
Questions 44

In the context of a swarm mode cluster, does this describe a node?

Solution: an instance of the Docker engine participating in the swarm

Options:

A.

Yes

B.

No

Buy Now
Questions 45

An application image runs in multiple environments, with each environment using different certificates and ports. Is this a way to provision configuration to containers at runtime?

Solution.Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates.

Options:

A.

Yes

B.

No

Buy Now
Questions 46

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution: Set IGNORE_TLS in the 'daemon.json' configuration file.

Options:

A.

Yes

B.

No

Buy Now
Questions 47

Is this an advantage of multi-stage builds?

Solution.better logical separation of Dockerfile instructions for increased readability

Options:

A.

Yes

B.

No

Buy Now
Questions 48

The Kubernetes yaml shown below describes a clusterIP service.

DCA Question 48

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of any pod with the label app: nginx on port 8080 will be forwarded to port 80 in that pod.

Options:

A.

Yes

B.

No

Buy Now
Questions 49

You configure a local Docker engine to enforce content trust by setting the environment variable

DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker container run myorg/myimage:1.0

Options:

A.

Yes

B.

No

Buy Now
Questions 50

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Delete the image and delete the image repository from Docker Trusted Registry

Options:

A.

Yes

B.

No

Buy Now
Questions 51

You want to create a container that is reachable from its host's network.

Does this action accomplish this?

Solution.Use either EXPOSE or -publish to access the container on the bridge network.

Options:

A.

Yes

B.

No

Buy Now
Exam Code: DCA
Exam Name: Docker Certified Associate (DCA) Exam
Last Update: May 1, 2025
Questions: 191

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now DCA testing engine

PDF (Q&A)

$36.75  $104.99
buy now DCA pdf