A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its
address space.
If every pod on this node has exactly two containers in it, how many pods can
this address space support on this node?
Answer : E
A Kubernetes node is allocated a /26 CIDR block (64 unique IPs) for its address space. This means that the node can assign up to 64 IP addresses to its resources, such as pods and containers. If every pod on this node has exactly two containers in it, then each pod will need two IP addresses, one for each container. Therefore, the node can support up to 32 pods, since 64 / 2 = 32. The other options are incorrect because they either exceed the available IP addresses or do not account for the number of containers per pod. Reference:
* CIDR Blocks and Container Engine for Kubernetes - Oracle
* How kubernetes assigns podCIDR for nodes? - Stack Overflow
You are pulling images from a Docker Trusted Registry installation
configured to use self-signed certificates, and this error appears:
`x509: certificate signed by unknown authority.
You already downloaded the Docker Trusted Registry certificate authority
certificate from https://dtr.example.com/ca.
How do you trust it? (Select two.)
Answer : C, E
To trust a self-signed certificate from a Docker Trusted Registry (DTR), you need to place the certificate in the appropriate location on all cluster nodes and restart the Docker daemon. There are two possible locations for the certificate, depending on your OS and Docker version1:
* /etc/docker/certs.d/dtr.example.com/ca.crt: This is the preferred location for Linux systems and Docker versions 1.13 and higher. This directory is scanned by Docker for certificates and keys for each registry domain2.
* Your OS certificate path: This is the fallback location for other OSes and Docker versions. You need to find the certificate store for your OS and copy the certificate there. You also need to trust the certificate system-wide, which may require additional steps depending on your OS3.
The other options are not correct because:
* Passing '-trust-certificate ca.crt to the Docker client is not a valid option. There is no such flag for the Docker client4.
* Placing the certificate in '/etc/docker/dtr/dtr.example.com.crt' is not a valid location. The certificate should be in the /etc/docker/certs.d directory, not the /etc/docker/dtr directory1.
* Passing -- insecure-registry to the Docker client is not a recommended option. This flag disables the TLS verification for the registry, which makes the communication insecure and vulnerable to attacks.
* Use self-signed certificates | Docker Docs
* Test an insecure registry | Docker Docs
* Add TLS certificates as a trusted root authority to the host OS | Docker Docs
* docker | Docker Docs
* [Deploy a registry server | Docker Docs]
Is this a way to configure the Docker engine to use a registry without a trusted TLS certificate?
Solution: Set IGNORE_TLS in the 'daemon.json' configuration file.
Answer : B
{ ''insecure-registries'' : [''myregistry.example.com:5000''] }
Daemon configuration file | Docker Docs
Verify repository client with certificates | Docker Docs
Test an insecure registry | Docker Docs
Content trust in Docker | Docker Docs
In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest', from being overwritten by another user with push access to the repository?
Solution: Tag the image with 'nginx:immutable'.
In Docker Trusted Registry, is this how a user can prevent an image, such as 'nginx:latest', from being overwritten by another user with push access to the repository?
Solution: Keep a backup copy of the image on another repository.
Is this an advantage of multi-stage builds?
Solution: simultaneously creates and tags multiple images
Answer : B
Are these conditions sufficient for Kubernetes to dynamically provision a persistentVolume, assuming there are no limitations on the amount and type of available external storage?
Solution: A persistentVolumeClaim is created that specifies a pre-defined storageClass.
Answer : A
= The conditions are sufficient for Kubernetes to dynamically provision a persistentVolume, because a storageClass defines the provisioner and parameters for creating a volume on-demand. A persistentVolumeClaim that specifies a storageClass triggers the dynamic provisioning process, and Kubernetes will automatically create and bind a persistentVolume that matches the request. This eliminates the need for manual intervention by cluster administrators to provision storage volumes.Reference:
Dynamic Volume Provisioning | Kubernetes
Persistent volumes and dynamic provisioning | Google Kubernetes Engine ...
Dynamic Provisioning and Storage Classes in Kubernetes