[Modify/Add] Implement Typos Workflow
This commit is contained in:
19
.github/workflows/typos.yml
vendored
Normal file
19
.github/workflows/typos.yml
vendored
Normal file
@@ -0,0 +1,19 @@
|
||||
name: Check typos
|
||||
on:
|
||||
pull_request:
|
||||
jobs:
|
||||
run:
|
||||
name: Spell Check with Typos
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout Actions Repository
|
||||
uses: actions/checkout@v2
|
||||
- name: Get changed files
|
||||
id: changed-files
|
||||
uses: tj-actions/changed-files@v14.4
|
||||
- name: Check spelling of file.txt
|
||||
if: ${{ steps.changed-files.outputs.all_changed_files != '' }}
|
||||
uses: crate-ci/typos@master
|
||||
with:
|
||||
files: ${{ steps.changed-files.outputs.all_changed_files }}
|
||||
config: ./.typos.toml
|
||||
14
.typos.toml
Normal file
14
.typos.toml
Normal file
@@ -0,0 +1,14 @@
|
||||
# https://github.com/crate-ci/typos/blob/master/docs/reference.md
|
||||
|
||||
[default.extend-words]
|
||||
# Don't correct the surname "Teh"
|
||||
Daa = 'Daa'
|
||||
CAF = 'CAF'
|
||||
|
||||
[type.png]
|
||||
extend-glob = ["*.png"]
|
||||
check-file = false
|
||||
|
||||
[type.jpg]
|
||||
extend-glob = ["*.jpg"]
|
||||
check-file = false
|
||||
@@ -111,7 +111,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
</details>
|
||||
|
||||
11. A customer is using multiple AWS accounts with separate billing. How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
||||
- A. Create one global AWS account and move all AWS resources to tha account.
|
||||
- A. Create one global AWS account and move all AWS resources to that account.
|
||||
- B. Sign up for three years of Reserved Instance pricing up front.
|
||||
- C. Use the consolidated billing feature from AWS Organizations.
|
||||
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
||||
@@ -152,7 +152,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
</details>
|
||||
|
||||
15. According to best practices, how should an application be designed to run in the AWS Cloud?
|
||||
- A. Use tighly coupled components.
|
||||
- A. Use tightly coupled components.
|
||||
- B. Use loosely coupled components.
|
||||
- C. Use infrequently coupled components.
|
||||
- D. Use frequently coupled components.
|
||||
|
||||
@@ -388,7 +388,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
</details>
|
||||
|
||||
1. According to best practices, how should an application be designed to run in the AWS Cloud?
|
||||
- A. Use tighly coupled components.
|
||||
- A. Use tightly coupled components.
|
||||
- B. Use loosely coupled components.
|
||||
- C. Use infrequently coupled components.
|
||||
- D. Use frequently coupled components.
|
||||
@@ -633,7 +633,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
</details>
|
||||
|
||||
1. A customer is using multiple AWS accounts with separate billing. <br/>How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
||||
- A. Create one global AWS acount and move all AWS resources to tha account.
|
||||
- A. Create one global AWS account and move all AWS resources to that account.
|
||||
- B. Sign up for three years of Reserved Instance pricing up front.
|
||||
- C. Use the consolidated billing feature from AWS Organizations.
|
||||
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
||||
|
||||
@@ -103,7 +103,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
- A. AWS Control Tower.
|
||||
- B. Amazon Macie.
|
||||
- C. AWS Systems Manager Patch Manager.
|
||||
- D. AWS Systems Manager Patch Manager AWS Security Hub.
|
||||
- D. AWS Security Hub.
|
||||
|
||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||
Correct answer: A
|
||||
@@ -112,8 +112,8 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
11. A company is running a large web application that needs to always be available. The application tends to slow down when CPU usage is greater than 60%. How can they track when CPU usage goes above 60% for any of the EC2 Instances in their account?
|
||||
- A. Use CloudFront to monitor the CPU usage.
|
||||
- B. Set the AWS Config CPU threshold to 60% to receive a notification when EC2 usage exceeds that value.
|
||||
- C. Use CloudWatch Alarms to monitor the CPUand alert when the CPU usage is >= 60%.
|
||||
- D. Use SNS to menitor the utilization of the server.
|
||||
- C. Use CloudWatch Alarms to monitor the CPU and alert when the CPU usage is >= 60%.
|
||||
- D. Use SNS to monitor the utilization of the server.
|
||||
|
||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||
Correct answer: C
|
||||
@@ -154,8 +154,8 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
- A. An IAM user is uniquely associated with only one person, however a role is intended to be assumable by anyone who needs it.
|
||||
- B. An IAM user has permanent credentials associated with it, however a role has temporary credentials associated with it.
|
||||
- C. IAM users are more cost effective than IAM roles.
|
||||
- D. Arole is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
|
||||
- E. An IAM user has temporary credentials associated withit, however a role has permanent credentials associated with it.
|
||||
- D. A role is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
|
||||
- E. An IAM user has temporary credentials associated with it, however a role has permanent credentials associated with it.
|
||||
|
||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||
Correct answer: A, B
|
||||
@@ -258,7 +258,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
- A. It eliminates the need for change management.
|
||||
- B. It allows for Cross-Region Replication.
|
||||
- C. It helps AWS customers reduce Privileged Access to AWS resources.
|
||||
- D. It allows individual application compenents or services to be modified without affecting other components.
|
||||
- D. It allows individual application components or services to be modified without affecting other components.
|
||||
|
||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||
Correct answer: D
|
||||
@@ -401,7 +401,7 @@ If this practice exam has been helpful to you please share it with others and re
|
||||
|
||||
39. A financial services company decides to migrate one of its applications to AWS. The application deals with sensitive data, such as credit card information, and must run on a PCI-compliant environment. Which of the following is the company’s responsibility when building a PCI-compliant environment in AWS? (Choose TWO)
|
||||
- A. Start the migration process immediately as all AWS services are PCI compliant.
|
||||
- B. Ensure that AWS services are configured properly to meetall PCI DSS standards.
|
||||
- B. Ensure that AWS services are configured properly to meet all PCI DSS standards.
|
||||
- C. Restrict any access to cardholder data and create a policy that addresses information security for all personnel.
|
||||
- D. Configure the underlying infrastructure of AWS services to meet all PCI DSS requirements.
|
||||
- E. Ensure that all PCI DSS physical security requirements are met.
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
# Security & Compliance
|
||||
|
||||
- [Security & Compliance](#security--compliance)
|
||||
- [Security \& Compliance](#security--compliance)
|
||||
- [AWS Shared Responsibility Model](#aws-shared-responsibility-model)
|
||||
- [Example, for RDS](#example-for-rds)
|
||||
- [Example, for S3](#example-for-s3)
|
||||
@@ -290,10 +290,10 @@
|
||||
- Abusive & prohibited behaviors are:
|
||||
- Spam – receiving undesired emails from AWS-owned IP address, websites & forums spammed by AWS resources
|
||||
- Port scanning – sending packets to your ports to discover the unsecured ones
|
||||
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhlem or crash your servers/softwares
|
||||
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhelm or crash your servers/softwares
|
||||
- Intrusion attempts – logging in on your resources
|
||||
- Hosting objectionable or copyrighted content – distributing illegal or copyrighted content without consent
|
||||
- Distributing malware – AWS resources distributing softwares to harm computers or machines
|
||||
- Distributing malware – AWS resources distributing software to harm computers or machines
|
||||
- Contact the AWS Abuse team: AWS abuse form, or abuse@amazonaws.com
|
||||
|
||||
## Root user privileges
|
||||
|
||||
Reference in New Issue
Block a user