Skip to content

Commit

Permalink
[Modify/Add] Implement Typos Workflow
Browse files Browse the repository at this point in the history
Merge pull request #175 from kananinirav/feature/implement-typos-workflow
  • Loading branch information
kananinirav authored Feb 27, 2024
2 parents 7b51cda + ff58794 commit 5cc3f39
Show file tree
Hide file tree
Showing 6 changed files with 47 additions and 14 deletions.
19 changes: 19 additions & 0 deletions .github/workflows/typos.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
name: Check typos
on:
pull_request:
jobs:
run:
name: Spell Check with Typos
runs-on: ubuntu-latest
steps:
- name: Checkout Actions Repository
uses: actions/checkout@v2
- name: Get changed files
id: changed-files
uses: tj-actions/[email protected]
- name: Check spelling of file.txt
if: ${{ steps.changed-files.outputs.all_changed_files != '' }}
uses: crate-ci/typos@master
with:
files: ${{ steps.changed-files.outputs.all_changed_files }}
config: ./.typos.toml
14 changes: 14 additions & 0 deletions .typos.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# https://github.com/crate-ci/typos/blob/master/docs/reference.md

[default.extend-words]
# Don't correct the surname "Teh"
Daa = 'Daa'
CAF = 'CAF'

[type.png]
extend-glob = ["*.png"]
check-file = false

[type.jpg]
extend-glob = ["*.jpg"]
check-file = false
4 changes: 2 additions & 2 deletions practice-exam/practice-exam-10.md
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>

11. A customer is using multiple AWS accounts with separate billing. How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
- A. Create one global AWS account and move all AWS resources to tha account.
- A. Create one global AWS account and move all AWS resources to that account.
- B. Sign up for three years of Reserved Instance pricing up front.
- C. Use the consolidated billing feature from AWS Organizations.
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
Expand Down Expand Up @@ -152,7 +152,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>

15. According to best practices, how should an application be designed to run in the AWS Cloud?
- A. Use tighly coupled components.
- A. Use tightly coupled components.
- B. Use loosely coupled components.
- C. Use infrequently coupled components.
- D. Use frequently coupled components.
Expand Down
4 changes: 2 additions & 2 deletions practice-exam/practice-exam-13.md
Original file line number Diff line number Diff line change
Expand Up @@ -388,7 +388,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>

1. According to best practices, how should an application be designed to run in the AWS Cloud?
- A. Use tighly coupled components.
- A. Use tightly coupled components.
- B. Use loosely coupled components.
- C. Use infrequently coupled components.
- D. Use frequently coupled components.
Expand Down Expand Up @@ -633,7 +633,7 @@ If this practice exam has been helpful to you please share it with others and re
</details>

1. A customer is using multiple AWS accounts with separate billing. <br/>How can the customer take advantage of volume discounts with minimal impact to the AWS resources?
- A. Create one global AWS acount and move all AWS resources to tha account.
- A. Create one global AWS account and move all AWS resources to that account.
- B. Sign up for three years of Reserved Instance pricing up front.
- C. Use the consolidated billing feature from AWS Organizations.
- D. Sign up for the AWS Enterprise support plan to get volume discounts.
Expand Down
14 changes: 7 additions & 7 deletions practice-exam/practice-exam-8.md
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ If this practice exam has been helpful to you please share it with others and re
- A. AWS Control Tower.
- B. Amazon Macie.
- C. AWS Systems Manager Patch Manager.
- D. AWS Systems Manager Patch Manager AWS Security Hub.
- D. AWS Security Hub.

<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: A
Expand All @@ -112,8 +112,8 @@ If this practice exam has been helpful to you please share it with others and re
11. A company is running a large web application that needs to always be available. The application tends to slow down when CPU usage is greater than 60%. How can they track when CPU usage goes above 60% for any of the EC2 Instances in their account?
- A. Use CloudFront to monitor the CPU usage.
- B. Set the AWS Config CPU threshold to 60% to receive a notification when EC2 usage exceeds that value.
- C. Use CloudWatch Alarms to monitor the CPUand alert when the CPU usage is >= 60%.
- D. Use SNS to menitor the utilization of the server.
- C. Use CloudWatch Alarms to monitor the CPU and alert when the CPU usage is >= 60%.
- D. Use SNS to monitor the utilization of the server.

<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: C
Expand Down Expand Up @@ -154,8 +154,8 @@ If this practice exam has been helpful to you please share it with others and re
- A. An IAM user is uniquely associated with only one person, however a role is intended to be assumable by anyone who needs it.
- B. An IAM user has permanent credentials associated with it, however a role has temporary credentials associated with it.
- C. IAM users are more cost effective than IAM roles.
- D. Arole is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
- E. An IAM user has temporary credentials associated withit, however a role has permanent credentials associated with it.
- D. A role is uniquely associated with only one person, however an IAM user is intended to be assumable by anyone who needs it.
- E. An IAM user has temporary credentials associated with it, however a role has permanent credentials associated with it.

<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: A, B
Expand Down Expand Up @@ -258,7 +258,7 @@ If this practice exam has been helpful to you please share it with others and re
- A. It eliminates the need for change management.
- B. It allows for Cross-Region Replication.
- C. It helps AWS customers reduce Privileged Access to AWS resources.
- D. It allows individual application compenents or services to be modified without affecting other components.
- D. It allows individual application components or services to be modified without affecting other components.

<details markdown=1><summary markdown='span'>Answer</summary>
Correct answer: D
Expand Down Expand Up @@ -401,7 +401,7 @@ If this practice exam has been helpful to you please share it with others and re

39. A financial services company decides to migrate one of its applications to AWS. The application deals with sensitive data, such as credit card information, and must run on a PCI-compliant environment. Which of the following is the company’s responsibility when building a PCI-compliant environment in AWS? (Choose TWO)
- A. Start the migration process immediately as all AWS services are PCI compliant.
- B. Ensure that AWS services are configured properly to meetall PCI DSS standards.
- B. Ensure that AWS services are configured properly to meet all PCI DSS standards.
- C. Restrict any access to cardholder data and create a policy that addresses information security for all personnel.
- D. Configure the underlying infrastructure of AWS services to meet all PCI DSS requirements.
- E. Ensure that all PCI DSS physical security requirements are met.
Expand Down
6 changes: 3 additions & 3 deletions sections/security_compliance.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Security & Compliance

- [Security & Compliance](#security--compliance)
- [Security \& Compliance](#security--compliance)
- [AWS Shared Responsibility Model](#aws-shared-responsibility-model)
- [Example, for RDS](#example-for-rds)
- [Example, for S3](#example-for-s3)
Expand Down Expand Up @@ -290,10 +290,10 @@
- Abusive & prohibited behaviors are:
- Spam – receiving undesired emails from AWS-owned IP address, websites & forums spammed by AWS resources
- Port scanning – sending packets to your ports to discover the unsecured ones
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhlem or crash your servers/softwares
- DoS or DDoS attacks – AWS-owned IP addresses attempting to overwhelm or crash your servers/softwares
- Intrusion attempts – logging in on your resources
- Hosting objectionable or copyrighted content – distributing illegal or copyrighted content without consent
- Distributing malware – AWS resources distributing softwares to harm computers or machines
- Distributing malware – AWS resources distributing software to harm computers or machines
- Contact the AWS Abuse team: AWS abuse form, or [email protected]

## Root user privileges
Expand Down

0 comments on commit 5cc3f39

Please sign in to comment.