[Modify/Add] Implement Typos Workflow

This commit is contained in:
Kanani Nirav
2024-02-27 19:02:00 +09:00
parent 7b51cda58b
commit ff58794b55
6 changed files with 47 additions and 14 deletions

19
.github/workflows/typos.yml vendored Normal file
View File

@@ -0,0 +1,19 @@
name: Check typos
on:
pull_request:
jobs:
run:
name: Spell Check with Typos
runs-on: ubuntu-latest
steps:
- name: Checkout Actions Repository
uses: actions/checkout@v2
- name: Get changed files
id: changed-files
uses: tj-actions/changed-files@v14.4
- name: Check spelling of file.txt
if: ${{ steps.changed-files.outputs.all_changed_files != '' }}
uses: crate-ci/typos@master
with:
files: ${{ steps.changed-files.outputs.all_changed_files }}
config: ./.typos.toml

14
.typos.toml Normal file
View File

@@ -0,0 +1,14 @@
# https://github.com/crate-ci/typos/blob/master/docs/reference.md
[default.extend-words]
# Don't correct the surname "Teh"
Daa = 'Daa'
CAF = 'CAF'
[type.png]
extend-glob = ["*.png"]
check-file = false
[type.jpg]
extend-glob = ["*.jpg"]
check-file = false

View File

@@ -111,7 +111,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>
11. A customer is using multiple AWS accounts with separate billing. How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
- A. Create one global AWS account and move all AWS resources to tha account.
- A. Create one global AWS account and move all AWS resources to that account.
- B. Sign up for three years of Reserved Instance pricing up front.
- C. Use the consolidated billing feature from AWS Organizations.
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
@@ -152,7 +152,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>
15. According to best practices, how should an application be designed to run in the AWS Cloud?
- A. Use tighly coupled components.
- A. Use tightly coupled components.
- B. Use loosely coupled components.
- C. Use infrequently coupled components.
- D. Use frequently coupled components.

View File

@@ -388,7 +388,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>
1. According to best practices, how should an application be designed to run in the AWS Cloud?
- A. Use tighly coupled components.
- A. Use tightly coupled components.
- B. Use loosely coupled components.
- C. Use infrequently coupled components.
- D. Use frequently coupled components.
@@ -633,7 +633,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>
1. A customer is using multiple AWS accounts with separate billing. <br/>How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
- A. Create one global AWS acount and move all AWS resources to tha account.
- A. Create one global AWS account and move all AWS resources to that account.
- B. Sign up for three years of Reserved Instance pricing up front.
- C. Use the consolidated billing feature from AWS Organizations.
- D. Sign up for the AWS Enterprise support plan to get volume discounts.

View File

@@ -103,7 +103,7 @@ If this practice exam has been helpful to you please share it with others and re
- A. AWS Control Tower.
- B. Amazon Macie.
- C. AWS Systems Manager Patch Manager.
- D. AWS Systems Manager Patch Manager AWS Security Hub.
- D. AWS Security Hub.
<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: A
@@ -112,8 +112,8 @@ If this practice exam has been helpful to you please share it with others and re
11. A company is running a large web application that needs to always be available. The application tends to slow down when CPU usage is greater than 60%. How can they track when CPU usage goes above 60% for any of the EC2 Instances in their account?
- A. Use CloudFront to monitor the CPU usage.
- B. Set the AWS Config CPU threshold to 60% to receive a notification when EC2 usage exceeds that value.
- C. Use CloudWatch Alarms to monitor the CPUand alert when the CPU usage is >= 60%.
- D. Use SNS to menitor the utilization of the server.
- C. Use CloudWatch Alarms to monitor the CPU and alert when the CPU usage is >= 60%.
- D. Use SNS to monitor the utilization of the server.
<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: C
@@ -154,8 +154,8 @@ If this practice exam has been helpful to you please share it with others and re
- A. An IAM user is uniquely associated with only one person, however a role is intended to be assumable by anyone who needs it.
- B. An IAM user has permanent credentials associated with it, however a role has temporary credentials associated with it.
- C. IAM users are more cost effective than IAM roles.
- D. Arole is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
- E. An IAM user has temporary credentials associated withit, however a role has permanent credentials associated with it.
- D. A role is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
- E. An IAM user has temporary credentials associated with it, however a role has permanent credentials associated with it.
<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: A, B
@@ -258,7 +258,7 @@ If this practice exam has been helpful to you please share it with others and re
- A. It eliminates the need for change management.
- B. It allows for Cross-Region Replication.
- C. It helps AWS customers reduce Privileged Access to AWS resources.
- D. It allows individual application compenents or services to be modified without affecting other components.
- D. It allows individual application components or services to be modified without affecting other components.
<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: D
@@ -401,7 +401,7 @@ If this practice exam has been helpful to you please share it with others and re
39. A financial services company decides to migrate one of its applications to AWS. The application deals with sensitive data, such as credit card information, and must run on a PCI-compliant environment. Which of the following is the companys responsibility when building a PCI-compliant environment in AWS? (Choose TWO)
- A. Start the migration process immediately as all AWS services are PCI compliant.
- B. Ensure that AWS services are configured properly to meetall PCI DSS standards.
- B. Ensure that AWS services are configured properly to meet all PCI DSS standards.
- C. Restrict any access to cardholder data and create a policy that addresses information security for all personnel.
- D. Configure the underlying infrastructure of AWS services to meet all PCI DSS requirements.
- E. Ensure that all PCI DSS physical security requirements are met.

View File

@@ -1,6 +1,6 @@
# Security & Compliance
- [Security & Compliance](#security--compliance)
- [Security \& Compliance](#security--compliance)
- [AWS Shared Responsibility Model](#aws-shared-responsibility-model)
- [Example, for RDS](#example-for-rds)
- [Example, for S3](#example-for-s3)
@@ -290,10 +290,10 @@
- Abusive & prohibited behaviors are:
- Spam receiving undesired emails from AWS-owned IP address, websites & forums spammed by AWS resources
- Port scanning sending packets to your ports to discover the unsecured ones
- DoS or DDoS attacks AWS-owned IP addresses attempting to overwhlem or crash your servers/softwares
- DoS or DDoS attacks AWS-owned IP addresses attempting to overwhelm or crash your servers/softwares
- Intrusion attempts logging in on your resources
- Hosting objectionable or copyrighted content distributing illegal or copyrighted content without consent
- Distributing malware AWS resources distributing softwares to harm computers or machines
- Distributing malware AWS resources distributing software to harm computers or machines
- Contact the AWS Abuse team: AWS abuse form, or abuse@amazonaws.com
## Root user privileges