Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Mirantis > Mirantis Certifications > DCA > DCA Online Practice Questions and Answers

DCA Online Practice Questions and Answers

Questions 4

Which 'docker run' flag lifts cgroup limitations?

A. 'docker run --isolation'

B. 'docker run --cap-drop'

C. 'docker run --privileged'

D. 'docker run --cpu-period'

Buy Now

Correct Answer: C

Questions 5

After creating a new service named 'http', you notice that the new service is not registering as healthy. How do you view the list of historical tasks for that service by using the command line?

A. 'docker inspect http'

B. 'docker service inspect http'

C. 'docker service ps http'

D. 'docker ps http'

Buy Now

Correct Answer: C

Questions 6

Which flag for a service would allow a container to consume more than 2 GB of memory only when there is no memory contention but would also prevent a container from consuming more than 4GB of memory, in any case?

A. --limit-memory 2GB --reserve-memory 4GB

B. --limit-memory 4GB --reserve-memory 2GB

C. --memory-swap 2GB --limit-memory 4GB

D. --memory-swap 4GB --limit-memory 2GB

Buy Now

Correct Answer: C

Questions 7

Is this a type of Linux kernel namespace that provides container isolation? Solution: Storage

A. Yes

B. No

Buy Now

Correct Answer: B

Storage is not a type of Linux kernel namespace that provides container isolation. Namespaces are a Linux kernel feature that provide isolation and virtualization of system resources for processes. They can be used to create isolated environments for containers that have their own view of system resources, such as process IDs, user IDs, network interfaces, etc. However, there is no storage namespace in Linux. The types of namespaces that exist are mount (mnt), process ID (pid), network (net), interprocess communication (ipc), user ID (user), control group (cgroup), time (time), and user namespace (uts).

Questions 8

Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry? Solution: Delete the image and delete the image repository from Docker Trusted Registry

A. Yes

B. No

Buy Now

Correct Answer: B

Deleting the image and deleting the image repository from Docker Trusted Registry (DTR) does not completely delete an image from disk in DTR. Deleting an image only removes its tag and association with a repository, but does not delete its underlying layers from disk. Deleting a repository only removes its metadata and tags, but does not delete its underlying layers from disk either. To completely delete an image from disk in DTR, you need to run a garbage collection job after deleting the image or the repository. A garbage collection job scans the DTR storage and removes any unused layers that are not referenced by any images or repositories.

Questions 9

You want to create a container that is reachable from its host's network. Does this action accomplish this? Solution: Use network attach to access the containers on the bridge network

A. Yes

B. No

Buy Now

Correct Answer: B

Using network attach to access the containers on the bridge network does not make the container reachable from its host's network. The network attach option connects a running container to another network, but it does not expose any ports to the host. To make a container reachable from its host's network, you need to use either EXPOSE or --publish to access the containers on the bridge network.

Questions 10

You add a new user to the engineering organization in DTR.

Will this action grant them read/write access to the engineering/api repository?

Solution: Add the user directly to the list of users with read/write access under the repository's Permissions tab.

A. Yes

B. No

Buy Now

Correct Answer: A

This action will grant them read/write access to the engineering/api repository, because adding a user directly to the list of users with read/write access under the repository's Permissions tab is one way to grant permissions to a user in DTR. According to the official documentation, this is an example of using fine-grained permissions for a repository.

Questions 11

You want to create a container that is reachable from its host's network.

Does this action accomplish this?

Solution: Use network connect to access the container on the bridge network.

A. Yes

B. No

Buy Now

Correct Answer: A

Using network connect to access the container on the bridge network does create a container that is reachable from its host's network. The network connect command connects a running container to another network. By default, Docker creates and connects containers to a bridge network, which is an internal network that isolates containers from each other and from the host. However, you can use network connect to connect a container to another network, such as the host network, which allows the container to share the host's network stack and be reachable from the host's network.

Questions 12

You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object.

Does this command display it?

Solution: kubectl get deployment api

A. Yes

B. No

Buy Now

Correct Answer: B

Using kubectl get deployment api does not display the events table for this object. The kubectl get command shows basic information about one or more resources, such as their name, age, status, etc. It does not show the events table, which is a list of events that occurred on the resource, such as creation, update, scaling, etc. To see the events table for this object, you need to use kubectl describe deployment api.

Questions 13

Is this an advantage of multi-stage builds?

Solution: better logical separation of Dockerfile instructions for increased readability

A. Yes

B. No

Buy Now

Correct Answer: B

Better logical separation of Dockerfile instructions for increased readability is not an advantage of multi-stage builds. Multi-stage builds are a feature that allows you to use multiple FROM statements in your Dockerfile. Each FROM statement begins a new stage of the build. You can selectively copy artifacts from one stage to another, leaving behind everything you don't want in the final image. The main advantage of multi-stage builds is that they allow you to reduce the size of your final image by only including the essential components and dependencies. Another advantage of multi-stage builds is that they allow you to optimize the build cache by grouping similar instructions in each stage. Better logical separation of Dockerfile instructions for increased readability is not an inherent advantage of multi-stage builds, as it depends on how you write and organize your Dockerfile.

Exam Code: DCA
Exam Name: Docker Certified Associate (DCA)
Last Update: Jun 07, 2025
Questions: 199

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.