Will this command ensure that overlay traffic between service tasks is encrypted? docker network create -d overlay --secure <network-name>
An application image runs in multiple environments, with each environment using different certificates and ports. Is this a way to provision configuration to containers at runtime?Create a Dockerfile for each environment, specifying ports and Docker secrets for certificates.
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?Delete the image and delete the image repository from Docker Trusted Registry
Will this sequence of steps completely delete an image from disk in the Docker Trusted Registry?Delete the image and run garbage collection on the Docker Trusted Registry.
Does this describe the role of Control Groups (cgroups) when used with a Docker container? user authorization to the Docker API
What is the difference between the ADD and COPY Dockerfile instructions? (Choose two.)