Your organization has a centralized logging solution, such as Splunk.
Will this configure a Docker container to export container logs to the logging solution?
Solution: docker logs
Will this command ensure that overlay traffic between service tasks is encrypted?
Solution:docker service create --network--secure
Is this a function of UCP?
Solution: image role-based access control
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?
Solution: Manually delete all layers used by the image on the disk from the Docker Trusted Registry.
During development of an application meant to be orchestrated by Kubernetes, you want to mount the /data directory on your laptop into a container.
Will this strategy successfully accomplish this?
Solution: Add a volume to the pod that sets hostPath.path: /data, and then mount this volume into the pod's containers as desired.