How does Docker contribute to improved security in CI/CD?
Docker enforces strict access control policies on application code
Docker's containerization provides isolation, limiting the impact of vulnerabilities
Docker eliminates the need for security updates by isolating applications
Docker automatically encrypts data at rest and in transit
In Docker Compose, what is the primary function of environment variables?
To pass dynamic configuration values to services at runtime
To configure the network settings for services
To specify the build context for a service's Dockerfile
To define the Docker image to be used for a service
What is the primary purpose of Docker Swarm?
Scanning Docker images for vulnerabilities
Storing and versioning Docker images
Building Docker images faster
Deploying and managing containerized applications at scale
What is the purpose of volume drivers in Docker?
To enable the use of remote storage or cloud-based solutions for volumes.
To improve the performance of volume operations.
To restrict container access to specific volumes.
To manage the lifecycle of bind mounts.
What is the role of authentication tokens in the context of a Docker Registry?
They are used to digitally sign images to ensure their integrity.
They define the network routes for communication between the registry and clients.
They provide temporary access credentials for interacting with the registry.
They are used to encrypt images stored in the registry.
Which flag is used with 'docker logs' to follow log output in real-time?
-r
-t
-f
-d
What is the primary way to define and deploy applications in a Docker Swarm?
Docker Compose files
Docker Swarm stacks
Dockerfiles
Kubernetes Deployments
How can you invalidate the Docker build cache for a specific instruction?
By using the --no-cache flag during the build process.
--no-cache
All of the above.
By deleting the corresponding image layer.
By modifying the instruction itself.
How can you control access to images stored in a private Docker Registry?
By using encryption to secure images during transmission
By configuring network firewalls to restrict access by IP address
By implementing authentication and authorization mechanisms within the registry
By regularly updating the registry software to patch vulnerabilities
What is the primary advantage of using multi-stage builds in Docker?
To improve network performance during the build process.
To enable parallel execution of build steps.
To simplify the process of building complex applications.
To reduce the size of the final Docker image.