ExamGecko

DCA: Docker Certified Associate

Docker Certified Associate
Vendor:

Docker

Docker Certified Associate Exam Questions: 183
Docker Certified Associate   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: DCA

Exam Name: Docker Certified Associate

Length of test: 120 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: 80 questions

Passing Score: 69%

Topics Covered:

  1. Container Orchestration (25% of the Exam): Understanding the basics and tools of container orchestration, including Docker Swarm and Kubernetes.

  2. Image Creation, Registry, and Management (20% of the Exam): Handling Docker images, including creation, registry management, and image handling.

  3. Installation and Configuration (15% of the Exam): Mastery in installing and configuring Docker.

  4. Networking (15% of the Exam): Configuring and managing Docker networks.

  5. Security (15% of the Exam): Knowledge of Docker security, container security, authentication, and access control.

  6. Storage and Volumes (10% of the Exam): Managing Docker storage and volumes.

This study guide should help you understand what to expect on DCA exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?

Solution. Set INSECURE_REGISTRY in the' /etc/docker/default' configuration file.

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

= Setting INSECURE_REGISTRY in the /etc/docker/default configuration file is one way to configure the Docker engine to use a registry without a trusted TLS certificate.This option tells the Docker daemon to accept insecure connections to the specified registry, bypassing the certificate verification1.However, this method is not recommended, as it exposes the registry and the Docker engine to potential security risks2.A better way to use a registry without a trusted TLS certificate is to add the registry's CA certificate to the Docker daemon's trust store, as described in the Docker documentation3or other online guides4.Reference:

1: How to build docker registry without SSL

2: Verify repository client with certificates | Docker Docs

3: ''docker pull'' certificate signed by unknown authority

4: Login to docker registry with client certificate under windows

asked 08/11/2024
Benice dobbins
44 questions

Will this command display a list of volumes for a specific container?

Solution. 'docker container logs nginx --volumes'

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

: The commanddocker container logs nginx --volumeswillnotdisplay a list of volumes for a specific container.Thedocker container logscommand shows the logs of a container, which are usually the standard output and standard error of the main process running in the container1.The--volumesflag is not a valid option for this command, and will result in an error message2.To display a list of volumes for a specific container, you can use thedocker inspectcommand with a filter option, such asdocker inspect -f '{{ .Mounts }}' nginx3.This will show the source, destination, mode, type, and propagation of each volume mounted in the container4.Reference:docker container logs,docker container logs nginx --volumes,docker inspect,docker inspect -f '{{ .Mounts }}' nginx

asked 08/11/2024
Kameron Katoku
47 questions

The Kubernetes yaml shown below describes a networkPolicy.

Will the networkPolicy BLOCK this traffic?

Solution: a request issued from a pod lacking the tier: api label, to a pod bearing the tier: backend label

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

The networkPolicy shown in the image is designed to block traffic from pods lacking the tier: api label, to pods bearing the tier: backend label. This is because the policy is set to matchLabels: tier: backend, and the ingress is set to - from: podSelector: matchLabels: tier: api. Therefore, any traffic that does not match these labels will be blocked.

Isolate containers with a user namespace | Docker Docs

The mnt namespace - Docker Cookbook - Second Edition

Container security fundamentals part 2: Isolation & namespaces

I hope this helps you understand the concept of networkPolicy and how it works with Kubernetes. If you have any other questions related to Docker, please feel free to ask me.

asked 08/11/2024
Nezha El Fakraoui
32 questions

Will this command list all nodes in a swarm cluster from the command line?

Solution. 'docker inspect nodes

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Is this a supported user authentication method for Universal Control Plane?

Solution. x.500

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

x.500 is not a supported user authentication method for Universal Control Plane (UCP).UCP supports two types of user authentication methods:built-inandexternal1. Built-in authentication uses the UCP's own database to store and verify user credentials.External authentication uses an external LDAP or Active Directory service to manage user accounts and passwords1.x.500 is a standard for directory services, which can be used by LDAP or Active Directory, but it is not a user authentication method by itself2.Reference:

User authentication | Docker Docs

asked 08/11/2024
Liam Harris
51 questions

One of several containers in a pod is marked as unhealthy after failing its livenessProbe many times. Is this the action taken by the orchestrator to fix the unhealthy container?

Solution: The controller managing the pod is autoscaled back to delete the unhealthy pod and alleviate load.

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

: = The livenessProbe is a mechanism that checks if the container is alive and healthy, and restarts it if it fails1.The orchestrator is the component that manages the deployment and scaling of containers across a cluster of nodes2.The action taken by the orchestrator to fix the unhealthy container isnotto autoscale back and delete the pod, but torecreatethe pod on the same or a different node3. This ensures that the desired number of replicas for the pod is maintained, and that the pod can resume its normal operation. Autoscaling back and deleting the pod would reduce the availability and performance of the service, and would not necessarily alleviate the load.

Configure Liveness, Readiness and Startup Probes | Kubernetes

What is a Container Orchestrator? | Docker

Pod Lifecycle | Kubernetes

I hope this helps you understand the concept of livenessProbe and orchestrator, and how they work with Docker and Kubernetes. If you have any other questions related to Docker, please feel free to ask me.

asked 08/11/2024
Christheo Van Rooyen
30 questions

A user's attempts to set the system time from inside a Docker container are unsuccessful.

Could this be blocking this operation?

Solution. SELinux

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

SELinux could be blocking the operation of setting the system time from inside a Docker container. SELinux is a security mechanism that enforces mandatory access control (MAC) policies on Linux systems. It restricts the actions that processes can perform based on their security contexts, such as user, role, type, and level. By default, SELinux prevents Docker containers from accessing or modifying the host's system time, as this could pose a security risk or cause inconsistency. To allow Docker containers to set the system time, SELinux needs to be configured with the appropriate permissions or labels, or disabled altogether. However, this is not recommended, as it could compromise the security and stability of the system.Reference:

Change system date time in Docker containers without impacting host

Change Date Inside a Docker Container

How to Handle Timezones in Docker Containers

5 ways to change time in Docker container

How to set system time dynamically in a Docker container

asked 08/11/2024
Joe Moore
37 questions

The Kubernetes yaml shown below describes a clusterIP service.

Is this a correct statement about how this service routes requests?

Solution: Traffic sent to the IP of this service on port 8080 will be routed to port 80 in a random pod with the label aPP: nginx.

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

The statement is correct. In the provided Kubernetes YAML, it's defined that traffic sent to the IP of this service on port 8080 will be routed to port 80 in a random pod with the label app: nginx. This is because it's a ClusterIP service type which is meant for internal communication within the cluster, and it uses selectors to route traffic to the correct pods.Reference:Docker Certified Associate Guide,DCA Prep Guide

asked 08/11/2024
John Hammonds
31 questions

A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its address space.

If every pod on this node has exactly two containers in it, how many pods can this address space support on this node?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Is this a function of UCP?

Solution: enforces the deployment of signed images to the cluster

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

= This is a function of UCP, as it integrates with Docker Trusted Registry (DTR) to provide built-in security and access control for your images. DTR allows you to enforce security policies and only allow running applications that use Docker images you know and trust. You can sign your images with Docker Content Trust (DCT) to prove their authenticity and integrity.UCP will verify the signatures of the images before deploying them to the cluster12.Reference:

Universal Control Plane overview | dockerlabs

How to Sign Your Docker Images to Increase Trust - How-To Geek

asked 08/11/2024
Lazar Marinovic
33 questions