You want to create a container that is reachable from its host's network.
Does this action accomplish this?
Solution: Use network attach to access the container on the bridge network.
A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster. Can this be used to schedule containers to meet the security policy requirements?
Solution.environment variables
Seven managers are in a swarm cluster.
Is this how should they be distributed across three datacenters or availability zones?
Solution: 4-2-1
Will this action upgrade Docker Engine CE to Docker Engine EE?
Solution: Delete '/var/lib/docker' directory.
The following Docker Compose file is deployed as a stack:
Is this statement correct about this health check definition?
Solution.Health checks lest for app health ten seconds apart. Three failed health checks transition the container into "unhealthy" status.
You are troubleshooting a Kubernetes deployment called api, and want to see the events table for this object. Does this command display it?
Solution: kubectl logs deployment api
Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?
Solution: A persistentVolumeClaim is created that specifies a pre-defined provisioner.
Will this command ensure that overlay traffic between service tasks is encrypted?
Solution:docker network create -d overlay --secure
Will this command list all nodes in a swarm cluster from the command line?
Solution: 'docker swarm nodes'
Can this set of commands identify the published port(s) for a container?
Solution. ‘docker container inspect", docker port'