Skip to content

Commit

Permalink
Fix various typos in topics/certificates (#10275)
Browse files Browse the repository at this point in the history
  • Loading branch information
cschindlbeck committed May 10, 2024
1 parent 895ac0f commit 9318b9b
Show file tree
Hide file tree
Showing 6 changed files with 8 additions and 8 deletions.
4 changes: 2 additions & 2 deletions certificates/aws-cloud-practitioner.md
Original file line number Diff line number Diff line change
Expand Up @@ -165,8 +165,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
<details>
<summary>True or False? The following are instance types available for a user in AWS:

* Compute optimizied
* Network optimizied
* Compute optimized
* Network optimized
* Web optimized</summary><br><b>

False. From the above list only compute optimized is available.
Expand Down
4 changes: 2 additions & 2 deletions certificates/aws-solutions-architect-associate.md
Original file line number Diff line number Diff line change
Expand Up @@ -188,8 +188,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
<details>
<summary>True or False? The following are instance types available for a user in AWS:

* Compute optimizied
* Network optimizied
* Compute optimized
* Network optimized
* Web optimized</summary><br><b>

False. From the above list only compute optimized is available.
Expand Down
2 changes: 1 addition & 1 deletion topics/aws/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -947,7 +947,7 @@ Launch configuration is a legacy form of Launch Template that must be recreated
In addition, launch template has the clear benefits of:
* Provision both On-Demand and Spot instances
* supporting multiple versions
* support creating parameters subsets (used for re-use and inheritance)
* support creating parameters subsets (used for reuse and inheritance)
</b></details>

#### ENI
Expand Down
2 changes: 1 addition & 1 deletion topics/kubernetes/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2739,7 +2739,7 @@ Istio is an open source service mesh that helps organizations run distributed, m
<details>
<summary>Name two controllers you are familiar with</summary><br><b>

1. Node Contorller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly.
1. Node Controller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly.
2. Replication Controller - monitors the status of pod replicas based on what should be running. It makes sure the number of pods that should be running is actually running
</b></details>

Expand Down
2 changes: 1 addition & 1 deletion topics/linux/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -1649,7 +1649,7 @@ There are 2 configuration files, which stores users information
<details>
<summary>Which file stores users passwords? Is it visible for everyone?</summary><br>

`/etc/shadow` file holds the passwords of the users in encryted format. NO, it is only visible to the `root` user
`/etc/shadow` file holds the passwords of the users in encrypted format. NO, it is only visible to the `root` user
</details>

<details>
Expand Down
2 changes: 1 addition & 1 deletion topics/security/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ The principle of least privilege refers to the practice of providing minimal per
* Subject name
* Subject Public Key info

Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of mutilple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively.
Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of multiple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively.

</b></details>

Expand Down

0 comments on commit 9318b9b

Please sign in to comment.