Question 76
You want to create a container that is reachable from its host's network. Does this action accomplish this?
Solution: Use --link to access the container on the bridge network.
Solution: Use --link to access the container on the bridge network.
Question 77
In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest', from being overwritten by another user with push access to the repository?
Solution: Remove push access from all other users.
Solution: Remove push access from all other users.
Question 78
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?
Solution. Set INSECURE_REGISTRY in the' /etc/docker/default' configuration file.
Solution. Set INSECURE_REGISTRY in the' /etc/docker/default' configuration file.
Question 79
Will a DTR security scan detect this?
Solution.private keys copied to the image
Solution.private keys copied to the image
Question 80
Your organization has a centralized logging solution, such as Splunk.
Will this configure a Docker container to export container logs to the logging solution?
Solution: docker logs <container-id>
Will this configure a Docker container to export container logs to the logging solution?
Solution: docker logs <container-id>