HomeQuizzes & SurveysDocker & CKA Practice Test 1 Docker & CKA Practice Test 1 Leave a Comment / By user / April 10, 2023 Welcome to your Docker & CKA Practice Test 1 Exam Instructions The exam comprises of the following types of questions: - Multiple Choice Single Response - Multiple Choice Multiple Response There is no negative marking. 1.Containers are run on which of these? A. Services B. Controllers C. Nodes D. None of these None 2.Kubernetes changed the name of cluster members to "Nodes." What were they called before that? Choose the Answer: A. Workers B. Cogs C. Minions D. Slaves None 3.Unique IP addresses are assigned to: Choose the Answer: A. NAT is used extensively, so unique IP addresses are irrelevant B. Pods C. Container Hosts D. Containers None 4.Usually, when submitting a Kubernetes API call, data is sent in which format? (Select all that apply) Choose the 2 correct answers: A. YAML B. XML C. DOC D. JSON 5.Which of these are not inherently created by Kubernetes? Choose the Answer: A. Services B. Nodes C. Controllers D. Pods None 6.Communications between the apiserver and the kubelet on the cluster nodes are used for all but which of the following? Choose the Answer A. Providing the kubelet's port-forwarding capability B. Fetching logs for pods C. Keep-alive xml packets D. Attaching (through kubectl) to running pods None 7.The connection between the apiserver and nodes, pods and services: A. Is unencrypted and therefore unsafe to run over public networks B. Is always encrypted with IPSec C. Is always encrypted using the method configured in the .kube file. D. Is currently encrypted with IPSec with plans to allow other encryption plugins later. None 8.If memory is running low on a running node, which of these keys will return "True"? Choose the Answer: A. OOM B. Warning C. MemoryPressure D. LowMemory None 9.what does a pod represent in a Kubernetes cluster? A. A running process B. Conditions under which applications will autoscale C. A set of rules for maintaining high availability D. All the containers in the cluster None 10.Which of these components mount volumes to containers? Choose the Answer A. kube-proxy B. fluentd C. kubelet D. kube-scheduler None 11.What is the difference between a Docker volume and a Kubernetes volume? Choose the Answer: A. Proximity: In Docker, volumes can reside on the same host with their containers. In Kubernetes, they must reside on separate metal for resiliency B. Back-end Drivers. Docker supports more block storage types than Kubernetes does. C. Size: Docker volumes are limited to 3TB. Kubernetes volumes are limited to 16TB. D. Volume lifetimes. In Docker, this is loosely defined. In Kubernetes, the volume has the same lifetime as its surrounding pod None 12.In a typical deployment, the Kubernetes Master listens on what port number? Choose the Answer A. 22 B. 3001 C. 80 D. 443 None 13.In Kubernetes, a group of one or more containers is called: Choose the Answer: A. A selector B. A pod C. A swarm D. A minion None 14.Which of these is a list of common Kubernetes primitives? Choose the Answer: A. service, deployment, replicaset, etcd B. pod, service, persistentVolume, deployment C. containers, vms, hypervisors, daemons D. pod, swarm, namespace, network None 15.What controls a Kubernetes cluster? Choose the Answer A. minikube B. The Master C. kube-proxy D. kubelet None 16.For network policies to work in Kubernetes, which of these must be true? Choose the Answer: A. The CNI must have a "policy" sidebar. B. The CNI must support VxLANs. C. Network policies are always enforced. D. The CNI must enforce the network policies None 17.Which platform(s) will Minikube run on? (Select all that apply) Choose the 3 correct answers: A. Mac OS X B. Windows C. Novell Netware v4 D. Linux 18.To deploy Kubernetes using kubeadm, you'll have to choose: Choose the Answer: A. The amount of RAM allocated to the Kubelets B. An appropriate CNI (Container Network Interface C. Between container space and swap space D. A passphrase for the certificates None 19.What is the node called that runs the api server? Choose the Answer: A. The Server B. The Top C. The Client D. The Master None 20.What do many Kubernetes deployment tools handle automatically for you? Choose the Answer: A. Kubectl installation on the master and nodes B. Custom namespaces C. Certificate creation D. CNI deployment None 21.Which of these is not a CNI provider? Choose the Answer A. Canal B. Flannel C. Weave Net D. Ceph None 22.Which of these is an inexpensive and easy way to try out Kubernetes? Choose the Answer: A. Manual Install B. Linux Foundation's CNI C. Turnkey D. Minikube None 23.In Kubernetes, one of the primitives is a Node (which was formerly referred to as a "Minion"). What does it represent? Choose the Answer: A. A virtual machine running the Kubelet and doing the compute work via Docker. B. A physical machine running the Kubelet and doing the compute work via a container service like Docker or Rocket C. A physical or virtual machine running the Kubelet and doing the compute work via a container service like Docker or Rocket. D. A virtual machine running the Kubelet and doing the compute work via a container service like Docker or Rocket None 24.What is the default encryption used in Kubernetes? (Choose the answer that is most correct.) Choose the Answer A. SSL B. TLS C. AES D. HTTPS None 25.What underlying technology does Flannel use to allow pods to communicate? Choose the Answer: A. GRE Tunnels B. VLANs C. IPSec Tunnels D. VxLANs None 26.How is authorization handled in Kubernetes? Choose the Answer: A. A built-in Role Based Access Control system. B. Through a variety of third-party authorization plugins. C. LDAP/AD D. Through user.permission files mounted via secrets None 27.Which types of API requests should be authenticated? Choose the Answer: A. Incoming requests from proxies B. Requests from users C. Node requests D. All of them None 28.You are writing YAML for a pod, and want to limit its CPU utilization to one quarter of the CPU. Which of the following lines will most likely be in your final YAML file? (Ignore whitespace) Choose the Answer A. cpu: "0.250m" B. cpu: "1:4" C. cpu: "25" D. cpu: "250m" None 29.Is it possible to configure an application in a container from Kubernetes? If so, how is this accomplished? Choose the Answer: A. Yes, through the use of environment variables. These can be set in the YAML file for the appropriate pod B. Yes, through the use of annotations. Annotations are key/value pairs used by the applications in the service. C. No, this is not possible at this time but is planned for a future release D. Yes, through the use of Network Policies. While originally intended to be the traffic cops of the network, developers often use them "off label" to configure applications None 30.There are many ways to assign a pod to a particular node, but they all involve the use of what? Choose the Answer: A. affinity or anti-affinity B. kubectl C. labels D. annotations None 31.Which of these commands would scale up a deployment called "soup" from 3 pods to 5? Choose the Answer A. kubectl scale current-replicas=3 replicas=5 ds/soup B. kubectl scale current-replicas 3 replicas 5 ds soup C. kubectl scale replicas=3 soup D. kubectl scale replicas=5 deployment/soup None 32.Which of these is the correct hierarchy of related Kubernetes API objects? Choose the Answer: A. Pods run services, which in turn are managed by deployments. B. Services point to pods. Pods are made up of deployments. C. Pods, services, and deployments refer to the same level of hierarchy in K8s. D. Pods make up deployments. Services point to deployments None 33.What are labels used for? Choose the Answer: A. Selecting objects for a variety of purposes. B. Setting environment variables in the container on a pod. C. Human-readable descriptions of objects. They have no other use D. Setting the image version number on a container in a pod. They have no other use. None 34.Which parameter is used to increase or decrease the number of pods that make up a deployment? Choose the Answer A. Syncs B. Nodes C. Replicants D. Replicas None 35.Which of these is the best use case for a DaemonSet? Choose the Answer: A. A monitoring back-end that only needs intermittent network access. B. A CNI container that needs to run on every node in order to function properly. C. A stateless web-head that will be load-balanced among many nodes D. A MariaDB/Galera cluster that must autoscale depending on CPU utilization None 36.Which of these is a difference between annotations and labels in Kubernetes? Choose the Answer: A. Labels are used to select and identify objects. Annotations are not. B. They are the same thing. C. Labels allow a wider variety of characters to be used in their names than annotations. D. Annotations use a key/value pair config map None 37.I have a deployment called "healer" running on my cluster. I look at the pods on a node and notice that there are two pods running there "healer-xxxxxxxx-yyyy" and "healer-xxxxxxxx-yyyz". What will happen if I issue the command "kubectl delete pod healer-xxxxxxxx-yyyz"? Choose the Answer: A. Nothing. The pod is protected by the deployment it runs in B. The pod will be deleted, but the deployment will immediately spin up another pod to replace it, possibly on another node C. The pod will be deleted. If there is an Ingress or Service Load balancer pointing to that pod, those requests will time out. D. Kubectl will issue an error message, as this pod is in use. Adding the force flag will allow you to complete this action None 38.What is the scheduler? Choose the Answer: A. An isolated, non-containerized process on the master node B. A subprocess of the CNI C. A pod on the master node. D. A distributed DaemonSet on the cluster. None 39. If a pod requests more resources than is available on any given node, what happens? Choose the Answer: A. The pod will move into a "NotReady" status. B. The scheduler will return an error C. The pod will not be scheduled until a node with the resources becomes available. D. The pod will get scheduled on the master node None 40.Why might a user desire two pods to have anti-affinity? Choose the Answer: A. She wants them to run on different nodes to avoid sharing failure domains B. She wants them to run on the same node to speed up networking traffic between them C. She wants them to be on network adjacent nodes for faster shared disk access. D. She wants them to share memory space on a node. None 41.Why are annotations particularly important when using multiple or custom schedulers? Choose the Answer: A. Because multiple schedulers are not allowed without annotations because of the security risk. B. Because they are the only audit trail available for the scheduler C. Because they are how the scheduler is specified D. Because they can remind operators which scheduler was used to place (or fail to place) a pod None 42.If a toleration and a taint match during scheduling, what happens? Choose the Answer: A. The toleration is ignored and the node might be scheduled for uncordon B. The taint is ignored and the pod might be scheduled to the nod C. The toleration and taint reinforce one another, further guaranteeing that the pod is not scheduled on the node. D. An error taints and tolerations cannot be used together in the same namespace None 43.How can a user specify which scheduler a pod should use? Choose the Answer A. Through the schedulerName tag in the spec. B. By adding a schedule=custom label to the metadata C. Through the scheduler-name tag in the spec. D. By adding a schedulerName=*scheduler* annotation to the metadata None 44.What are taints and what are they applied to? Choose the Answer: A. Taints are used to repel certain pods from nodes and are applied to nodes B. Taints are used to repel workloads with certain labels and are applied to nodes and pods. C. Taints are used to mark a pod as unavailable during an outage and are applied to pods. D. Taints are used to repel workloads from one another (anti-affinity) and are applied to pods None 45.When an API request is made to create a pod, which piece determines which node will be used to instantiate the new pod? Choose the Answer: A. The API Server itself B. The Kubelet on the target node C. The scheduler D. kube-proxy finds a free node None 46.What is podAffinity used for? Choose the Answer A. Ensuring replicated pods in the same deployment are placed on different nodes. B. Preventing two pods from being placed on the same node. C. Allowing nodes with containers in the same pod access to a higher-speed network. D. Placing two or more pods on the same node. None 47.How can a pod be assigned to a specific node? Choose the Answer: A. Using a nodeSelector with properly labelled nodes. B. The scheduler does not allow for pods to be placed manually C. Set node constraints in the node's YAML D. Use the host property in the pod's YAML. None 48.What's the recommended method for dealing with applications that insist on writing out logs to a file rather than being able to redirect them to stdout? Choose the Answer A. Find a logging agent that can operate inside the pod and send the logs to a central file store or log aggregator. B. Don't use Kubernetes C. Do without logging. D. Redirect the log file to ephemeral storage on the hos None 49.I have a node called "node8" and I'd like to know what kind of load it's under including the CPU and Memory requests. Which of these commands would give me that information? Choose the Answer: A. kubectl get nodes status{cpu.requests}&&{memory.requests B. kubectl describe deployments all-namespaces with-nodes C. kubectl describe node node8 D. kubeadm status node8 None 50.Where does the Kubernetes key/value store (etcd) log file reside? Choose the Answer: A. On the host in /var/log/kubernetes/etcd B. On the host in /var/log/pods C. On the host in /var/syslog D. On the host in /etc/kubernetes/etcd.log None Time's up