Free DCA Exam Braindumps (page: 3)

Page 3 of 42

Which of the following statements is true about secrets?

  1. Secrets can be created from any node in the cluster.
  2. Secrets can be modified after they are created.
  3. Secret are stored unencrypted on manager nodes.
  4. Secrets can be created using standard input (STDIN) and a file.

Answer(s): D



Following the principle of least privilege, which of the following methods can be used to securely grnt access to the specific user to communicate to a Docker engine? (Choose two.)

  1. Utilize the '--host 0.0.0.0:2375' option to the Docker daemon to listen on port 2375 over TCP on all interfaces
  2. Utilize open ssl to create TLSclient and server certificates, configuring the Docker engine to use with mutual TLS over TCP.
  3. Utilize the '--host 127.0.0.1:2375' option to the Docker daemon to listen on port 2375 over TCP on localhost
  4. Give the user root access to the server to allow them to run Docker commands as root.
  5. Add the user to the 'docker' group on the server or specify the group with the'--group' Docker daemon option.

Answer(s): B,E



Which of the following is supported by control groups?

  1. Manage certificates
  2. Collect net
  3. Limit CPU usage within a container
  4. Isolate processes in a container

Answer(s): C



What is the purpose of Docker Content Trust?

  1. Signing and verification of imagetags
  2. Enabling mutual TLS between the Docker client and server
  3. Docker registry TLS verification and encryption
  4. Indicating an image on Docker Hub is an official image

Answer(s): A



Page 3 of 42



Post your Comments and Discuss Docker DCA exam with other Community members:

Simon commented on October 24, 2024
guys waht do you think about this dump?
Anonymous
upvote