Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory? Solution: cgroups
A. Yes
B. No
What is the difference between the ADD and COPY dockerfile instructions? (choosen 2)
A. ADD supports compression format handling while COPY does not.
B. COPY supports regular expression handling while ADD does not.
C. COPY supports compression format handling while ADD does not.
D. ADD support remote URL handling while COPY does not.
E. ADD supports regular expression handling while COPY does not.
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object.
Does this command display it?
Solution: kubectl describe deployment api
A. Yes
B. No
Will this command mount the host's '/data' directory to the ubuntu container in read-only mode? Solution: 'docker run --add-volume /data /mydata -read-only ubuntu'
A. Yes
B. No
You want to create a container that is reachable from its host's network.
Does this action accomplish this?
Solution: Use --link to access the container on the bridge network.
A. Yes
B. No
Which one of the following commands will result in the volume being removed automatically once the container has exited?
A. 'docker run --del -v /foo busybox'
B. 'docker run --read-only -v /foo busybox'
C. 'docker run --rm -v /foo busybox'
D. 'docker run --remove -v /foo busybox'
Which flag for a service would allow a container to consume more than 2 GB of memory only when there is no memory contention but would also prevent a container from consuming more than 4GB of memory, in any case?
A. --limit-memory 2GB --reserve-memory 4GB
B. --limit-memory 4GB --reserve-memory 2GB
C. --memory-swap 2GB --limit-memory 4GB
D. --memory-swap 4GB --limit-memory 2GB
You configure a local Docker engine to enforce content trust by setting the environment variable
DOCKER_CONTENT_TRUST=1.
If myorg/myimage: 1.0 is unsigned, does Docker block this command?
Solution: docker service create myorg/myimage:1.0
A. Yes
B. No
Which of the following commands will create a swarm service which only listens on port 53 using the UDP protocol?
A. docker service create --name dns-cache -p 53:53/udp dns-cache
B. docker service create --name dns-cache -p 53:53 --service udp dns-cache
C. docker service create --name dns-cache -p 53:53 ..constraint networking.protocol.udp=true dns-cache
D. docker service create --name dns-cache -p 53:53 --udp dns-cache
Does this describe the role of Control Groups (cgroups) when used with a Docker container? Solution: role-based access control to clustered resources
A. Yes
B. No
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mirantis exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your DCA exam preparations and Mirantis certification application, do not hesitate to visit our Vcedump.com to find your solutions here.