Question 31

During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.
Will this strategy successfully accomplish this?
Solution: Add a volume to the pod that sets hostPath.path: /data, and then mount this volume into the pod's containers as desired.
  • Question 32

    A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.
    Can this be used to schedule containers to meet the security policy requirements?
    Solution: resource reservation
  • Question 33

    In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest', from being overwritten by another user with push access to the repository?
    Solution: Use the DTR web Ul to make all tags in the repository immutable.
  • Question 34

    Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?
    Solution: Delete the image and run garbage collection on the Docker Trusted Registry.
  • Question 35

    Which of the following are types of namespaces used by Docker to provide isolation? (Choose 2.)