You want to create a container that is reachable from its host's network.
Does this action accomplish this?
Solution: Use network attach to access the container on the bridge network.
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?
Solution: Delete the image and delete the image repository from Docker Trusted Registry
Will this command list all nodes in a swarm cluster from the command line?
Solution: 'docker swarm nodes'
A persistentVolumeClaim (PVC) is created with the specification storageClass: "".and size requirements that cannot be satisfied by any existing persistentVolume.
Is this an action Kubernetes takes in this situation?
Solution: Kubernetes returns an error indicating that the PVC could not be bound with the current resources.
Two pods bear the same label, app: dev.
Will a label selector matching app: dev match both of these pods?
Is this a type of Linux kernel namespace that provides container isolation?
Solution: Authentication
Two development teams in your organization use Kubernetes and want to deploy their applications while ensuring that Kubernetes-specific resources, such as secrets, are grouped together for each application.
Is this a way to accomplish this?
Solution: Add all the resources to the default namespace.
Which statement is correct about cluster management in Docker Enterprise Edition 3.x?
Does this command display all the pods in the cluster that are labeled as 'env: development'?
Solution: 'kubectl get pods --all-namespaces -label env=development'
A company's security policy specifies that development and production containers must run on separate nodes in a given Swarm cluster.
Can this be used to schedule containers to meet the security policy requirements?
Solution: node taints