Question 76

You want to create a container that is reachable from its host's network. Does this action accomplish this?
Solution: Use --link to access the container on the bridge network.
  • Question 77

    In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest', from being overwritten by another user with push access to the repository?
    Solution: Remove push access from all other users.
  • Question 78

    Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?
    Solution. Set INSECURE_REGISTRY in the' /etc/docker/default' configuration file.
  • Question 79

    Will a DTR security scan detect this?
    Solution.private keys copied to the image
  • Question 80

    Your organization has a centralized logging solution, such as Splunk.
    Will this configure a Docker container to export container logs to the logging solution?
    Solution: docker logs <container-id>