Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

DCA Docker Certified Associate (DCA) Exam Questions and Answers

Questions 4

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?

Solution.label constraints

Options:

A.

Yes

B.

No

Buy Now
Questions 5

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?

Solution: Delete the image and run garbage collection on the Docker Trusted Registry.

Options:

A.

Yes

B.

No

Buy Now
Questions 6

How do you change the default logging driver for the docker daemon in Linux?

Options:

A.

Install a logging agent on the Linux host.

B.

Set the value of 'log-driver' to the name of the logging driver in the daemon.json in /etc/docker.

C.

Use the -log-driver1 flag when you run a container.

D.

At the command line, type: docker log driver set

Buy Now
Questions 7

Will this Linux kernel facility limit a Docker container's access to host resources, such as CPU or memory?

Solution: namespaces

Options:

A.

Yes

B.

No

Buy Now
Questions 8

What is the difference between the ADD and COPY Dockerfile instructions? (Select two.)

Options:

A.

ADD supports remote URL handling while COPY does not.

B.

COPY supports compression format handling while ADD does not.

C.

COPY supports regular expression handling while ADD does not.

D.

ADD supports regular expression handling while COPY does not.

E.

ADD supports compression format handling while COPY does not.

Buy Now
Questions 9

Can this set of commands identify the published port(s) for a container?

Solution: `docker network inspect', `docker port'

Options:

A.

Yes

B.

No

Buy Now
Questions 10

Will this command list all nodes in a swarm cluster from the command line?

Solution: 'docker swarm nodes'

Options:

A.

Yes

B.

No

Buy Now
Questions 11

You set up an automatic pruning policy on a DTR repository to prune all images using Apache licenses.

What effect does this have on images in this repository?

Options:

A.

Matching images are untagged during the next prune job.

B.

Matching images are deleted during the next prune job.

C.

Matching images are untagged once they are older than the pruning threshold set in the repository's Settings tab.

D.

Matching images are untagged during the next prune job, and subsequently deleted once they are older than the pruning threshold set in the repository's Settings tab.

Buy Now
Questions 12

You configure a local Docker engine to enforce content trust by setting the environment variable

DOCKER_CONTENT_TRUST=1.

If myorg/myimage: 1.0 is unsigned, does Docker block this command?

Solution: docker service create myorg/myimage:1.0

Options:

A.

Yes

B.

No

Buy Now
Questions 13

Will this action upgrade Docker Engine CE to Docker Engine EE?

Solution: Uninstall 'docker-ce' package before installing 'docker-ee' package.

Options:

A.

Yes

B.

No

Buy Now
Questions 14

Will a DTR security scan detect this?

Solution.private keys copied to the image

Options:

A.

Yes

B.

No

Buy Now
Questions 15

Seven managers are in a swarm cluster.

Is this how should they be distributed across three datacenters or availability zones?

Solution: 4-2-1

Options:

A.

Yes

B.

No

Buy Now
Questions 16

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: resource reservation

Options:

A.

Yes

B.

No

Buy Now
Questions 17

In the context of a swarm mode cluster, does this describe a node?

Solution: an instance of the Docker engine participating in the swarm

Options:

A.

Yes

B.

No

Buy Now
Questions 18

Is this a type of Linux kernel namespace that provides container isolation?

Solution.Process ID

Options:

A.

Yes

B.

No

Buy Now
Questions 19

Will this configuration achieve fault tolerance for managers in a swarm?

Solution: an odd number of manager nodes, totaling more than two

Options:

A.

Yes

B.

No

Buy Now
Questions 20

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution: Add them to a team in the engineering organization that has read/write access to the engineering/api repository.

Options:

A.

Yes

B.

No

Buy Now
Questions 21

Is this statement correct?

Solution: A Dockerfile provides instructions for building a Docker image

Options:

A.

Yes

B.

No

Buy Now
Questions 22

Is this a type of Linux kernel namespace that provides container isolation?

Solution: Authentication

Options:

A.

Yes

B.

No

Buy Now
Questions 23

Will this command list all nodes in a swarm cluster from the command line?

Solution: ‘docker Is -a’

Options:

A.

Yes

B.

No

Buy Now
Questions 24

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution: ‘docker service create -name dns-cache -p 53:53 -service udp dns-cache'

Options:

A.

Yes

B.

No

Buy Now
Questions 25

Does this describe the role of Control Groups (cgroups) when used with a Docker container?

Solution: accounting and limiting of resources

Options:

A.

Yes

B.

No

Buy Now
Questions 26

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution. Create a collection for for each application.

Options:

A.

Yes

B.

No

Buy Now
Questions 27

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Solution: 'kubectl get pods --all-namespaces -I env=development'

Options:

A.

Yes

B.

No

Buy Now
Questions 28

The following Docker Compose file is deployed as a stack:

DCA Question 28

Is this statement correct about this health check definition?

Solution: Health checks test for app health five seconds apart. If the test fails, the container will be restarted three times before it gets rescheduled.

Options:

A.

Yes

B.

No

Buy Now
Questions 29

Is this a function of UCP?

Solution: enforces the deployment of signed images to the cluster

Options:

A.

Yes

B.

No

Buy Now
Questions 30

You created a new service named 'http' and discover it is not registering as healthy. Will this command enable you to view the list of historical tasks for this service?

Solution: 'docker ps http'

Options:

A.

Yes

B.

No

Buy Now
Questions 31

Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.

Is this a way to accomplish this?

Solution: Add all the resources to the default namespace.

Options:

A.

Yes

B.

No

Buy Now
Questions 32

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A persistentVolumeClaim is created that specifies a pre-defined provisioner.

Options:

A.

Yes

B.

No

Buy Now
Questions 33

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.

Can this be used to schedule containers to meet the security policy requirements?

Solution: node taints

Options:

A.

Yes

B.

No

Buy Now
Questions 34

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Solution: 'kubectl get pods --all-namespaces -label env=development'

Options:

A.

Yes

B.

No

Buy Now
Questions 35

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution: Set IGNORE_TLS in the 'daemon.json' configuration file.

Options:

A.

Yes

B.

No

Buy Now
Questions 36

Will this configuration achieve fault tolerance for managers in a swarm?

Solution: at least seven nodes in total

Options:

A.

Yes

B.

No

Buy Now
Questions 37

Is this statement correct?

Solution: A Dockerfile stores the Docker daemon's configuration options.

Options:

A.

Yes

B.

No

Buy Now
Questions 38

You want to provide a configuration file to a container at runtime. Does this set of Kubernetes tools and steps accomplish this?

Solution: Mount the configuration file directly into the appropriate pod and container using the .spec.containers.configMounts key.

Options:

A.

Yes

B.

No

Buy Now
Questions 39

Which networking drivers allow you to enable multi-host network connectivity

between containers?

Options:

A.

macvlan, ipvlan, and overlay

B.

bridge, user-defined, host

C.

host, macvlan, overlay, user-defined

D.

bridge, macvlan, ipvlan, overlay

Buy Now
Questions 40

Does this command create a swarm service that only listens on port 53 using the UDP protocol?

Solution. ‘docker service create -name dns-cache -p 53:53 -udp dns-cache’

Options:

A.

Yes

B.

No

Buy Now
Questions 41

A persistentVolumeClaim (PVC) is created with the specification storageClass: "", and size requirements that cannot be satisfied by any existing persistentVolume.

Is this an action Kubernetes takes in this situation?

Solution: The PVC remains unbound until a persistentVolume that matches all requirements of the PVC becomes available.

Options:

A.

Yes

B.

No

Buy Now
Questions 42

Is this a supported user authentication method for Universal Control Plane?

Solution.SAML

Options:

A.

Yes

B.

No

Buy Now
Questions 43

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution. Set and export the IGNORE_TLS environment variable on the command line.

Options:

A.

Yes

B.

No

Buy Now
Questions 44

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution.pid

Options:

A.

Yes

B.

No

Buy Now
Questions 45

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?

Solution: kubectl events deployment api

Options:

A.

Yes

B.

No

Buy Now
Questions 46

Will this command mount the host's '/data' directory to the ubuntu container in read-only mode?

Solution: 'docker run --add-volume /data /mydata -read-only ubuntu'

Options:

A.

Yes

B.

No

Buy Now
Questions 47

A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?

Solution.environment variables

Options:

A.

Yes

B.

No

Buy Now
Questions 48

Some Docker images take time to build through a Continuous Integration environment. You want to speed up builds and take advantage of build caching.

Where should the most frequently changed part of a Docker image be placed in a Dockerfile?

Options:

A.

at the top of the Dockerfile

B.

after the FROM directive

C.

at the bottom of the Dockerfile

D.

in the ENTRYPOINT directive

Buy Now
Questions 49

Is this a function of UCP?

Solution: scans images to detect any security vulnerability

Options:

A.

Yes

B.

No

Buy Now
Questions 50

Does this command display all the pods in the cluster that are labeled as 'env: development'?

Solution: 'kubectl get pods -I env=development'

Options:

A.

Yes

B.

No

Buy Now
Questions 51

One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times. Is this the action taken by the orchestrator to fix the unhealthy container?

Solution: Kubernetes automatically triggers a user-defined script to attempt to fix the unhealthy container.

Options:

A.

Yes

B.

No

Buy Now
Questions 52

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution: mnt

Options:

A.

Yes

B.

No

Buy Now
Questions 53

The Kubernetes yaml shown below describes a networkPolicy.

DCA Question 53

Will the networkPolicy BLOCK this traffic?

Solution: a request issued from a pod bearing the tier: backend label, to a pod bearing the tier: frontend label

Options:

A.

Yes

B.

No

Buy Now
Questions 54

In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest’, from being overwritten by another user with push access to the repository?

Solution: Use the DTR web Ul to make all tags in the repository immutable.

Options:

A.

Yes

B.

No

Buy Now
Questions 55

Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?

Solution: A default storageClass is specified, and subsequently a persistentVolumeClaim is created.

Options:

A.

Yes

B.

No

Buy Now
Questions 56

Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker engine runtime to be used?

Solution: net

Options:

A.

Yes

B.

No

Buy Now
Questions 57

The Kubernetes yaml shown below describes a networkPolicy.

DCA Question 57

Will the networkPolicy BLOCK this trafftc?

Solution. a request issued from a pod bearing only the tier: frontend label, to a pod bearing the tier: backend label

Options:

A.

Yes

B.

No

Buy Now
Exam Code: DCA
Exam Name: Docker Certified Associate (DCA) Exam
Last Update: Apr 28, 2025
Questions: 191

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now DCA testing engine

PDF (Q&A)

$31.5  $104.99
buy now DCA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 29 Apr 2025