[Modify/Add] Implement Typos Workflow
This commit is contained in:
19
.github/workflows/typos.yml
vendored
Normal file
19
.github/workflows/typos.yml
vendored
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
name: Check typos
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
jobs:
|
||||||
|
run:
|
||||||
|
name: Spell Check with Typos
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout Actions Repository
|
||||||
|
uses: actions/checkout@v2
|
||||||
|
- name: Get changed files
|
||||||
|
id: changed-files
|
||||||
|
uses: tj-actions/changed-files@v14.4
|
||||||
|
- name: Check spelling of file.txt
|
||||||
|
if: ${{ steps.changed-files.outputs.all_changed_files != '' }}
|
||||||
|
uses: crate-ci/typos@master
|
||||||
|
with:
|
||||||
|
files: ${{ steps.changed-files.outputs.all_changed_files }}
|
||||||
|
config: ./.typos.toml
|
||||||
14
.typos.toml
Normal file
14
.typos.toml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# https://github.com/crate-ci/typos/blob/master/docs/reference.md
|
||||||
|
|
||||||
|
[default.extend-words]
|
||||||
|
# Don't correct the surname "Teh"
|
||||||
|
Daa = 'Daa'
|
||||||
|
CAF = 'CAF'
|
||||||
|
|
||||||
|
[type.png]
|
||||||
|
extend-glob = ["*.png"]
|
||||||
|
check-file = false
|
||||||
|
|
||||||
|
[type.jpg]
|
||||||
|
extend-glob = ["*.jpg"]
|
||||||
|
check-file = false
|
||||||
@@ -111,7 +111,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
</details>
|
</details>
|
||||||
|
|
||||||
11. A customer is using multiple AWS accounts with separate billing. How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
11. A customer is using multiple AWS accounts with separate billing. How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
||||||
- A. Create one global AWS account and move all AWS resources to tha account.
|
- A. Create one global AWS account and move all AWS resources to that account.
|
||||||
- B. Sign up for three years of Reserved Instance pricing up front.
|
- B. Sign up for three years of Reserved Instance pricing up front.
|
||||||
- C. Use the consolidated billing feature from AWS Organizations.
|
- C. Use the consolidated billing feature from AWS Organizations.
|
||||||
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
||||||
@@ -152,7 +152,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
</details>
|
</details>
|
||||||
|
|
||||||
15. According to best practices, how should an application be designed to run in the AWS Cloud?
|
15. According to best practices, how should an application be designed to run in the AWS Cloud?
|
||||||
- A. Use tighly coupled components.
|
- A. Use tightly coupled components.
|
||||||
- B. Use loosely coupled components.
|
- B. Use loosely coupled components.
|
||||||
- C. Use infrequently coupled components.
|
- C. Use infrequently coupled components.
|
||||||
- D. Use frequently coupled components.
|
- D. Use frequently coupled components.
|
||||||
|
|||||||
@@ -388,7 +388,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
</details>
|
</details>
|
||||||
|
|
||||||
1. According to best practices, how should an application be designed to run in the AWS Cloud?
|
1. According to best practices, how should an application be designed to run in the AWS Cloud?
|
||||||
- A. Use tighly coupled components.
|
- A. Use tightly coupled components.
|
||||||
- B. Use loosely coupled components.
|
- B. Use loosely coupled components.
|
||||||
- C. Use infrequently coupled components.
|
- C. Use infrequently coupled components.
|
||||||
- D. Use frequently coupled components.
|
- D. Use frequently coupled components.
|
||||||
@@ -633,7 +633,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
</details>
|
</details>
|
||||||
|
|
||||||
1. A customer is using multiple AWS accounts with separate billing. <br/>How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
1. A customer is using multiple AWS accounts with separate billing. <br/>How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
|
||||||
- A. Create one global AWS acount and move all AWS resources to tha account.
|
- A. Create one global AWS account and move all AWS resources to that account.
|
||||||
- B. Sign up for three years of Reserved Instance pricing up front.
|
- B. Sign up for three years of Reserved Instance pricing up front.
|
||||||
- C. Use the consolidated billing feature from AWS Organizations.
|
- C. Use the consolidated billing feature from AWS Organizations.
|
||||||
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
|
||||||
|
|||||||
@@ -103,7 +103,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
- A. AWS Control Tower.
|
- A. AWS Control Tower.
|
||||||
- B. Amazon Macie.
|
- B. Amazon Macie.
|
||||||
- C. AWS Systems Manager Patch Manager.
|
- C. AWS Systems Manager Patch Manager.
|
||||||
- D. AWS Systems Manager Patch Manager AWS Security Hub.
|
- D. AWS Security Hub.
|
||||||
|
|
||||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||||
Correct answer: A
|
Correct answer: A
|
||||||
@@ -112,8 +112,8 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
11. A company is running a large web application that needs to always be available. The application tends to slow down when CPU usage is greater than 60%. How can they track when CPU usage goes above 60% for any of the EC2 Instances in their account?
|
11. A company is running a large web application that needs to always be available. The application tends to slow down when CPU usage is greater than 60%. How can they track when CPU usage goes above 60% for any of the EC2 Instances in their account?
|
||||||
- A. Use CloudFront to monitor the CPU usage.
|
- A. Use CloudFront to monitor the CPU usage.
|
||||||
- B. Set the AWS Config CPU threshold to 60% to receive a notification when EC2 usage exceeds that value.
|
- B. Set the AWS Config CPU threshold to 60% to receive a notification when EC2 usage exceeds that value.
|
||||||
- C. Use CloudWatch Alarms to monitor the CPUand alert when the CPU usage is >= 60%.
|
- C. Use CloudWatch Alarms to monitor the CPU and alert when the CPU usage is >= 60%.
|
||||||
- D. Use SNS to menitor the utilization of the server.
|
- D. Use SNS to monitor the utilization of the server.
|
||||||
|
|
||||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||||
Correct answer: C
|
Correct answer: C
|
||||||
@@ -154,8 +154,8 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
- A. An IAM user is uniquely associated with only one person, however a role is intended to be assumable by anyone who needs it.
|
- A. An IAM user is uniquely associated with only one person, however a role is intended to be assumable by anyone who needs it.
|
||||||
- B. An IAM user has permanent credentials associated with it, however a role has temporary credentials associated with it.
|
- B. An IAM user has permanent credentials associated with it, however a role has temporary credentials associated with it.
|
||||||
- C. IAM users are more cost effective than IAM roles.
|
- C. IAM users are more cost effective than IAM roles.
|
||||||
- D. Arole is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
|
- D. A role is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
|
||||||
- E. An IAM user has temporary credentials associated withit, however a role has permanent credentials associated with it.
|
- E. An IAM user has temporary credentials associated with it, however a role has permanent credentials associated with it.
|
||||||
|
|
||||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||||
Correct answer: A, B
|
Correct answer: A, B
|
||||||
@@ -258,7 +258,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
- A. It eliminates the need for change management.
|
- A. It eliminates the need for change management.
|
||||||
- B. It allows for Cross-Region Replication.
|
- B. It allows for Cross-Region Replication.
|
||||||
- C. It helps AWS customers reduce Privileged Access to AWS resources.
|
- C. It helps AWS customers reduce Privileged Access to AWS resources.
|
||||||
- D. It allows individual application compenents or services to be modified without affecting other components.
|
- D. It allows individual application components or services to be modified without affecting other components.
|
||||||
|
|
||||||
<details markdown=1><summary markdown='span'>Answer</summary>
|
<details markdown=1><summary markdown='span'>Answer</summary>
|
||||||
Correct answer: D
|
Correct answer: D
|
||||||
@@ -401,7 +401,7 @@ If this practice exam has been helpful to you please share it with others and re
|
|||||||
|
|
||||||
39. A financial services company decides to migrate one of its applications to AWS. The application deals with sensitive data, such as credit card information, and must run on a PCI-compliant environment. Which of the following is the company’s responsibility when building a PCI-compliant environment in AWS? (Choose TWO)
|
39. A financial services company decides to migrate one of its applications to AWS. The application deals with sensitive data, such as credit card information, and must run on a PCI-compliant environment. Which of the following is the company’s responsibility when building a PCI-compliant environment in AWS? (Choose TWO)
|
||||||
- A. Start the migration process immediately as all AWS services are PCI compliant.
|
- A. Start the migration process immediately as all AWS services are PCI compliant.
|
||||||
- B. Ensure that AWS services are configured properly to meetall PCI DSS standards.
|
- B. Ensure that AWS services are configured properly to meet all PCI DSS standards.
|
||||||
- C. Restrict any access to cardholder data and create a policy that addresses information security for all personnel.
|
- C. Restrict any access to cardholder data and create a policy that addresses information security for all personnel.
|
||||||
- D. Configure the underlying infrastructure of AWS services to meet all PCI DSS requirements.
|
- D. Configure the underlying infrastructure of AWS services to meet all PCI DSS requirements.
|
||||||
- E. Ensure that all PCI DSS physical security requirements are met.
|
- E. Ensure that all PCI DSS physical security requirements are met.
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
# Security & Compliance
|
# Security & Compliance
|
||||||
|
|
||||||
- [Security & Compliance](#security--compliance)
|
- [Security \& Compliance](#security--compliance)
|
||||||
- [AWS Shared Responsibility Model](#aws-shared-responsibility-model)
|
- [AWS Shared Responsibility Model](#aws-shared-responsibility-model)
|
||||||
- [Example, for RDS](#example-for-rds)
|
- [Example, for RDS](#example-for-rds)
|
||||||
- [Example, for S3](#example-for-s3)
|
- [Example, for S3](#example-for-s3)
|
||||||
@@ -290,10 +290,10 @@
|
|||||||
- Abusive & prohibited behaviors are:
|
- Abusive & prohibited behaviors are:
|
||||||
- Spam – receiving undesired emails from AWS-owned IP address, websites & forums spammed by AWS resources
|
- Spam – receiving undesired emails from AWS-owned IP address, websites & forums spammed by AWS resources
|
||||||
- Port scanning – sending packets to your ports to discover the unsecured ones
|
- Port scanning – sending packets to your ports to discover the unsecured ones
|
||||||
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhlem or crash your servers/softwares
|
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhelm or crash your servers/softwares
|
||||||
- Intrusion attempts – logging in on your resources
|
- Intrusion attempts – logging in on your resources
|
||||||
- Hosting objectionable or copyrighted content – distributing illegal or copyrighted content without consent
|
- Hosting objectionable or copyrighted content – distributing illegal or copyrighted content without consent
|
||||||
- Distributing malware – AWS resources distributing softwares to harm computers or machines
|
- Distributing malware – AWS resources distributing software to harm computers or machines
|
||||||
- Contact the AWS Abuse team: AWS abuse form, or abuse@amazonaws.com
|
- Contact the AWS Abuse team: AWS abuse form, or abuse@amazonaws.com
|
||||||
|
|
||||||
## Root user privileges
|
## Root user privileges
|
||||||
|
|||||||
Reference in New Issue
Block a user