Docker DCA Docker Certified Associate (DCA) Exam Online Training
Docker DCA Online Training
The questions for DCA were last updated at Mar 25,2024.
- Exam Code: DCA
- Exam Name: Docker Certified Associate (DCA) Exam
- Certification Provider: Docker
- Latest update: Mar 25,2024
Which of the following is supported by control groups?
- A . Manage certificates
- B . Collect net
- C . Limit CPU usage within a container
- D . Isolate processes in a container
Will this Linux kernel facility limit a Docker container’s access to host resources, such as CPU or memory?
Solution: seccomp
- A . Yes
- B . No
How do you change the default logging driver for the docker daemon in Linux?
- A . Set the value of log-driver to the name of the logging driver In the daemon.json In /etc/doc
- B . Use the -log-driver’ flag when you run a container.
- C . At the command line, type: docker log driver set <driver name>
- D . Install a logging agent on the Linux host.
A server is running low on disk space.
What command can be used to check the disk usage of images, containers, and volumes for Docker engine?
- A . ‘docker system df’
- B . ‘docker system prune’
- C . ‘docker system free’
- D . ‘docker system ps’
What is the difference between a resource limit and a resource reservation when scheduling services?
- A . A resource limit and a resource reservation can be used interchangeably.
- B . A resource limit is a soft limit for your service, while a reservation is hard limit and the docker engine will do its best to keep your service at the limit.
- C . A resource limit is used to find a host with adequate resources for scheduling a hard limit for your service, while a reservation is hard limit for your service.
- D . A resource limit is hard limit for your service, while a reservation is used to find a host with adequate
resources for scheduling. Correct
Which of the following commands is used to display system-wide Docker configuration on a host?
- A . docker info
- B . docker status
- C . docker inspect
- D . docker system
Which of the following statements is true about secrets?
- A . Secrets can be created from any node in the cluster.
- B . Secrets can be modified after they are created.
- C . Secret are stored unencrypted on manager nodes.
- D . Secrets can be created using standard input (STDIN) and a file.
Will this command list all nodes in a swarm cluster from the command line?
Solution: ‘docker swarm nodes’
- A . Yes
- B . No
Does this describe the role of Control Groups (cgroups) when used with a Docker container?
Solution: role-based access control to clustered resources
- A . Yes
- B . No
In the context of a swarm mode cluster, does this describe a node?
Solution: a virtual machine participating in the swarm
- A . Yes
- B . No