Join the discussion
Question 1/154
You configure a local Docker engine to enforce content trust by setting the environment variable DOCKER_CONTENT_TRUST=1.
If myorg/myimage: 1.0 is unsigned, does Docker block this command?
Solution: docker image inspect myorg/myimage: 1.0
If myorg/myimage: 1.0 is unsigned, does Docker block this command?
Solution: docker image inspect myorg/myimage: 1.0
Correct Answer: A
= Docker will block the command docker image inspect myorg/myimage: 1.0 if the image tag is unsigned and the environment variable DOCKER_CONTENT_TRUST is set to 1. This is because Docker Content Trust (DCT) enables the verification of the integrity and publisher of Docker images using digital signatures1. When DCT is enabled, Docker will only pull, run, or inspect images that have a valid signature2. If the image tag is not signed, Docker will reject the command and display an error message, such as No valid trust data for 1.03.
To inspect an unsigned image, you need to either disable DCT by setting DOCKER_CONTENT_TRUST to 0, or use the --disable-content-trust flag with the command. References:
* Content trust in Docker | Docker Docs
* Enable and disable content trust in Docker | Docker Docs
* Docker Content Trust: What It Is and How It Secures Container Images
* [docker image inspect | Docker Docs]
To inspect an unsigned image, you need to either disable DCT by setting DOCKER_CONTENT_TRUST to 0, or use the --disable-content-trust flag with the command. References:
* Content trust in Docker | Docker Docs
* Enable and disable content trust in Docker | Docker Docs
* Docker Content Trust: What It Is and How It Secures Container Images
* [docker image inspect | Docker Docs]
Add Comments
- Other Question (154q)
- Q1. You configure a local Docker engine to enforce content trust by setting the environment va...
- Q2. You want to mount external storage to a particular filesystem path in a container in a Kub...
- Q3. Will this Linux kernel facility limit a Docker container's access to host resources, such ...
- Q4. Will this action upgrade Docker Engine CE to Docker Engine EE? Solution: Delete '/var/lib/...
- Q5. Is this statement correct? Solution. A Dockerfile stores persistent data between deploymen...
- Q6. Is this the purpose of Docker Content Trust? Solution: Enable mutual TLS between the Docke...
- Q7. You want to provide a configuration file to a container at runtime. Does this set of Kuber...
- Q8. Will a DTR security scan detect this? Solution: licenses for known third party binary comp...
- Q9. Is this the purpose of Docker Content Trust? Solution: Verify and encrypt Docker registry ...
- Q10. Is this statement correct? Solution: A Dockerfile provides instructions for building a Doc...
- Q11. Your organization has a centralized logging solution, such as Sptunk. Will this configure ...
- Q12. Will This command list all nodes in a swarm cluster from the command line? Solution. 'dock...
- Q13. Will this command mount the host's '/data' directory to the ubuntu container in read-only ...
- Q14. Does this command create a swarm service that only listens on port 53 using the UDP protoc...
- Q15. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q16. Will this command mount the host's '/data' directory to the ubuntu container in read-only ...
- Q17. Is this the purpose of Docker Content Trust? Solution: Enable mutual TLS between the Docke...
- Q18. Your organization has a centralized logging solution, such as Sptunk. Will this configure ...
- Q19. What is the difference between the ADD and COPY dockerfile instructions? (choosen 2)...
- Q20. The Kubernetes yaml shown below describes a networkPolicy. (Exhibit) Will the networkPolic...
- Q21. Seven managers are in a swarm cluster. Is this how should they be distributed across three...
- Q22. Does this describe the role of Control Groups (cgroups) when used with a Docker container?...
- Q23. Will this command list all nodes in a swarm cluster from the command line? Solution: 'dock...
- Q24. Will this command display a list of volumes for a specific container? Solution:docker volu...
- Q25. A company's security policy specifies that development and production containers must run ...
- Q26. Can this set of commands identify the published port(s) for a container? Solution: docker ...
- Q27. Which of the following is required to install Docker EE from a package repository?...
- Q28. Does this describe the role of Control Groups (cgroups) when used with a Docker container?...
- Q29. You created a new service named 'http* and discover it is not registering as healthy. Will...
- Q30. One of several containers in a pod is marked as unhealthy after failing its livenessProbe ...
- Q31. Does this command create a swarm service that only listens on port 53 using the UDP protoc...
- Q32. The following Docker Compose file is deployed as a stack: (Exhibit) Is this statement corr...
- Q33. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q34. Will this command mount the host's '/data* directory to the ubuntu container in read-only ...
- Q35. Two development teams in your organization use Kubernetes and want to deploy their applica...
- Q36. Your organization has a centralized logging solution, such as Splunk. Will this configure ...
- Q37. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q38. A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its address space. If ...
- Q39. A company's security policy specifies that development and production containers must run ...
- Q40. Seven managers are in a swarm cluster. Is this how should they be distributed across three...
- Q41. The Kubernetes yaml shown below describes a clusterIP service. (Exhibit) Is this a correct...
- Q42. During development of an application meant to be orchestrated by Kubemetes, you want to mo...
- Q43. Can this set of commands identify the published port(s) for a container? Solution. 'docker...
- Q44. During development of an application meant to be orchestrated by Kubernetes, you want to m...
- Q45. You want to mount external storage to a particular filesystem path in a container in a Kub...
- Q46. Will this command mount the host's '/data' directory to the ubuntu container in read-only ...
- Q47. Which of these swarm manager configurations will cause the cluster to be in a lost quorum ...
- Q48. The following health check exists in a Dockerfile: 'HEALTCHECK CMD curl --fail http://loca...
- Q49. Which docker run` flag lifts cgroup limitations?...
- Q50. Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker...
- Q51. You configure a local Docker engine to enforce content trust by setting the environment va...
- Q52. One of several containers in a pod is marked as unhealthy after failing its livenessProbe ...
- Q53. One of several containers in a pod is marked as unhealthy after failing its livenessProbe ...
- Q54. Does this command create a swarm service that only listens on port 53 using the UDP protoc...
- Q55. Will this sequence of steps completely delete an image from disk in the Docker Trusted Reg...
- Q56. Which of the following commands starts a Redis container and configures it to always resta...
- Q57. Which of the following are types of namespaces used by Docker to provide isolation? (Choos...
- Q58. A user is having problems running Docker. Which of the following will start Docker in debu...
- Q59. In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest...
- Q60. A user's attempts to set the system time from inside a Docker container are unsuccessful. ...
- Q61. You are troubleshooting a Kubernetes deployment called api, and want to see the events tab...
- Q62. During development of an application meant to be orchestrated by Kubernetes, you want to m...
- Q63. You created a new service named 'http' and discover it is not registering as healthy. Will...
- Q64. Is this a supported user authentication method for Universal Control Plane? Solution. x.50...
- Q65. How do you change the default logging driver for the docker daemon in Linux?...
- Q66. Will this action upgrade Docker Engine CE to Docker Engine EE? Solution: Delete '/var/lib/...
- Q67. Your organization has a centralized logging solution, such as Splunk. Will this configure ...
- Q68. Following the principle of least privilege, which of the following methods can be used to ...
- Q69. Which networking drivers allow you to enable multi-host network connectivity between conta...
- Q70. The following Docker Compose file is deployed as a stack: (Exhibit) Is this statement corr...
- Q71. Two development teams in your organization use Kubernetes and want to deploy their applica...
- Q72. Is this an advantage of multi-stage builds? Solution: better caching when building Docker ...
- Q73. A company's security policy specifies that development and production containers must run ...
- Q74. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q75. Can this set of commands identify the published port(s) for a container? Solution. 'docker...
- Q76. Is this a function of UCP? Solution: scans images to detect any security vulnerability...
- Q77. Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume...
- Q78. Will this command list all nodes in a swarm cluster from the command line? Solution: 'dock...
- Q79. Will this Linux kernel facility limit a Docker container's access to host resources, such ...
- Q80. When seven managers are in a swarm cluster how would they be distributed across three data...
- Q81. Does this describe the role of Control Groups (cgroups) when used with a Docker container?...
- Q82. Which of the following is true about using the '-P' option when creating a new container?...
- Q83. Will a DTR security scan detect this? Solution. private keys copied to the image...
- Q84. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q85. Two development teams in your organization use Kubernetes and want to deploy their applica...
- Q86. Will this command list all nodes in a swarm cluster from the command line? Solution. 'dock...
- Q87. Will a DTR security scan detect this? Solution: licenses for known third party binary comp...
- Q88. You configure a local Docker engine to enforce content trust by setting the environment va...
- Q89. You are troubleshooting a Kubernetes deployment called api, and want to see the events tab...
- Q90. You want to provide a configuration file to a container at runtime. Does this set of Kuber...
- Q91. You want to provide a configuration file to a container at runtime. Does this set of Kuber...
- Q92. Is this a way to configure the Docker engine to use a registry without a trusted TLS certi...
- Q93. You want to create a container that is reachable from its host's network. Does this action...
- Q94. Does this describe the role of Control Groups (cgroups) when used with a Docker container?...
- Q95. When using the Docker client to push an image to a registry, what environment variable is ...
- Q96. Will this action upgrade Docker Engine CE to Docker Engine EE? Solution: Uninstall 'docker...
- Q97. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q98. Your organization has a centralized logging solution, such as Splunk. Will this configure ...
- Q99. An application image runs in multiple environments, with each environment using different ...
- Q100. In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest...
- Q101. An application image runs in multiple environments, with each environment using different ...
- Q102. A docker service 'web' is running with a scale factor of 1 (replicas = 1). Bob intends to ...
- Q103. In Docker Trusted Registry, how would a user prevent an image, for example 'nginx:latest' ...
- Q104. Will this sequence of steps completely delete an image from disk in the Docker Trusted Reg...
- Q105. You created a new service named 'http' and discover it is not registering as healthy. Will...
- Q106. Is this the purpose of Docker Content Trust? Solution: Enable mutual TLS between the Docke...
- Q107. A server is running low on disk space. What command can be used to check the disk usage of...
- Q108. Which of the following constitutes a production-ready devicemapper configuration for the D...
- Q109. Does this command display all the pods in the cluster that are labeled as 'env: developmen...
- Q110. Your organization has a centralized logging solution, such as Splunk. Will this configure ...
- Q111. You created a new service named 'http* and discover it is not registering as healthy. Will...
- Q112. Will this configuration achieve fault tolerance for managers in a swarm? Solution: only tw...
- Q113. You created a new service named 'http' and discover it is not registering as healthy. Will...
- Q114. The Kubernetes yaml shown below describes a networkPolicy. (Exhibit) Will the networkPolic...
- Q115. Seven managers are in a swarm cluster. Is this how should they be distributed across three...
- Q116. Is this a type of Linux kernel namespace that provides container isolation? Solution: Stor...
- Q117. Two development teams in your organization use Kubernetes and want to deploy their applica...
- Q118. A user's attempts to set the system time from inside a Docker container are unsuccessful. ...
- Q119. Does this command create a swarm service that only listens on port 53 using the UDP protoc...
- Q120. An application image runs in multiple environments, with each environment using different ...
- Q121. Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume...
- Q122. The Kubernetes yaml shown below describes a clusterIP service. (Exhibit) Is this a correct...
- Q123. Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume...
- Q124. Will this command list all nodes in a swarm cluster from the command line? Solution. 'dock...
- Q125. Is this the purpose of Docker Content Trust? Solution: Verify and encrypt Docker registry ...
- Q126. Is this a function of UCP? Solution: scans images to detect any security vulnerability...
- Q127. Will this configuration achieve fault tolerance for managers in a swarm? Solution: an odd ...
- Q128. Will this command list all nodes in a swarm cluster from the command line? Solution. 'dock...
- Q129. Seven managers are in a swarm cluster. Is this how should they be distributed across three...
- Q130. Which docker run` flag lifts cgroup limitations?...
- Q131. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q132. Will this command display a list of volumes for a specific container? Solution. 'docker co...
- Q133. During development of an application meant to be orchestrated by Kubernetes, you want to m...
- Q134. In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest...
- Q135. A users attempts to set the system time from inside a Docker container are unsuccessful. C...
- Q136. You want to create a container that is reachable from its host's network. Does this action...
- Q137. You are running only Kubernetes workloads on a worker node that requires maintenance, such...
- Q138. You want to create a container that is reachable from its host's network. Does this action...
- Q139. You want to create a container that is reachable from its host's network. Does this action...
- Q140. Is this a type of Linux kernel namespace that provides container isolation? Solution: Netw...
- Q141. Is this a supported user authentication method for Universal Control Plane? Solution. SAML...
- Q142. Will this command ensure that overlay traffic between service tasks is encrypted? Solution...
- Q143. Is this a type of Linux kernel namespace that provides container isolation? Solution: Netw...
- Q144. Will this command display a list of volumes for a specific container? Solution: docker vol...
- Q145. Is this a Linux kernel namespace that is disabled by default and must be enabled at Docker...
- Q146. A host machine has four CPUs available and two running containers. The sysadmin would like...
- Q147. The following Docker Compose file is deployed as a stack: (Exhibit) Is this statement corr...
- Q148. The Kubernetes yaml shown below describes a networkPolicy. (Exhibit) Will the networkPolic...
- Q149. One of several containers in a pod is marked as unhealthy after failing its livenessProbe ...
- Q150. Will this command display a list of volumes for a specific container? Solution: docker vol...
- Q151. The following health check exists in a Dockerfile: 'HEALTCHECK CMD curl --fail http://loca...
- Q152. Will this command list all nodes in a swarm cluster from the command line? Solution: 'dock...
- Q153. You want to provide a configuration file to a container at runtime. Does this set of Kuber...
- Q154. In the context of a swarm mode cluster, does this describe a node? Solution: a physical ma...
