Trending questions in Edureka Community

0 votes
1 answer

Can I build a sprint velocity trend chart in Google Data Studio?

Yes, you can use Google Data Studio ...READ MORE

Apr 15 in PMP by Naira
236 views
0 votes
1 answer

What is TCP Connect scanning, and when is it used?

​TCP Connect scanning is a fundamental port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
260 views
0 votes
1 answer

How to combine DatePipe and CurrencyPipe to display formatted transaction details?

In Angular templates, combine DatePipe and CurrencyPipe ...READ MORE

Apr 16 in Node-js by anonymous
234 views
0 votes
1 answer

How does AI collect information?

Artificial Intelligence (AI) collects and processes data ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
254 views
0 votes
1 answer

How to handle exceptions within a custom pipe's transform method gracefully?

To handle exceptions gracefully within a custom ...READ MORE

Apr 17 in Node-js by anonymous
212 views
0 votes
1 answer

What’s the most effective way to manage RAID logs in Notion?

Managing RAID logs (Risks, Assumptions, Issues, and ...READ MORE

Apr 15 in PMP by Naira
245 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
236 views
0 votes
1 answer

How can you extract data using NetBIOS Name Service (NBNS)?

NetBIOS Name Service (NBNS), also known as ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
251 views
0 votes
1 answer

How do you establish OKR tracking in Notion or ClickUp?

OKRs (Objectives and Key Results) are an ...READ MORE

Apr 15 in PMP by Naira
232 views
0 votes
1 answer

How to utilize JsonPipe to debug complex objects in templates?

Use JsonPipe in Angular templates to convert ...READ MORE

Apr 16 in Node-js by anonymous
224 views
0 votes
1 answer

How do I monitor schedule variance (SV) in Microsoft Project?

Schedule Variance (SV) is a project performance ...READ MORE

Apr 15 in PMP by Naira
224 views
0 votes
1 answer

How to chain pipes to format and truncate strings in Angular templates?

In Angular templates, you can chain pipes ...READ MORE

Apr 16 in Node-js by anonymous
223 views
0 votes
1 answer

Can DNS zone transfers be used for attacks other than enumeration?

DNS zone transfers (AXFR) are legitimate mechanisms ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
248 views
0 votes
1 answer

What’s the difference between burndown and burnup charts in Scrum dashboards?

Burndown and burnup charts are crucial Scrum ...READ MORE

Apr 15 in PMP by Naira
240 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

How does NTP enumeration help in time-based attacks?

​Network Time Protocol (NTP) enumeration can assist ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
228 views
0 votes
1 answer

How to develop a pipe that formats credit card numbers with masking?

To develop a pipe that formats and ...READ MORE

Apr 17 in Laravel by anonymous
202 views
0 votes
1 answer

How can Nmap be used by threat actors?

​Nmap (Network Mapper) is a powerful open-source ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
269 views
0 votes
0 answers

What are the steps to set up a basic routing system in a React application using React Router?

Can you tell me What are the ...READ MORE

Apr 17 in Node-js by Nidhi
• 16,260 points
172 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
207 views
0 votes
1 answer

Can I integrate Confluence meeting notes with my JIRA sprints?

Yes, you can link Confluence meeting notes ...READ MORE

Apr 15 in PMP by Naira
211 views
0 votes
0 answers
0 votes
1 answer

What’s the impact of Theory of Constraints (TOC) in project bottleneck management?

Eliyahu Goldratt invented the Theory of Constraints ...READ MORE

Apr 14 in PMP by Naira
256 views
0 votes
1 answer

What are countermeasures against VoIP enumeration attacks?

To prevent SIP endpoint and extension enumeration ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
218 views
0 votes
1 answer

What indicates that a port is closed during a stealth scan?

​In a stealth scan, such as Nmap's ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
233 views
0 votes
1 answer

How does machine learning detect anomalies in port scans?

​Machine learning (ML) models are increasingly employed ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
257 views
0 votes
1 answer

What is the difference between hping2 and Hping3?

Hping2 vs. Hping3: Key Differences in Features, ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
229 views
0 votes
1 answer

How does MITRE ATT&CK framework help in vulnerability tracking?

The MITRE ATT&CK framework is a comprehensive ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
254 views
0 votes
1 answer

How do you calculate project float manually vs. using a tool?

Project float (or slack) refers to the ...READ MORE

Apr 15 in PMP by Naira
209 views
0 votes
1 answer

What role does SPI (Schedule Performance Index) play in forecasting delays?

SPI (timetable Performance Index) is a project ...READ MORE

Apr 15 in PMP by Naira
208 views
0 votes
1 answer

Design a workflow to generate context-aware embeddings for legal document indexing in LLamaIndex.

You can generate context-aware embeddings for legal ...READ MORE

Apr 21 in Generative AI by mimi
207 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
237 views
0 votes
1 answer

How does IP fragmentation work?

​IP fragmentation is a mechanism used in ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
245 views
0 votes
1 answer

What is active vs passive enumeration, and when is each used?

Active vs. Passive Enumeration: Understanding the Differences ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
244 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
215 views
0 votes
1 answer

Who are the three main participants in the man in the middle attack?

​In a Man-in-the-Middle (MitM) attack, three primary ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
198 views
0 votes
1 answer

How can AI enhance the accuracy of real-time monitoring in IoT networks?

​Artificial Intelligence (AI) significantly enhances the accuracy ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
239 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
181 views
0 votes
1 answer

How does AI detect invasive scanning techniques?

AI enhances network security by detecting invasive ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
211 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
178 views
0 votes
1 answer

What’s the best method for implementing a Change Control Board (CCB) process?

A CCB is a formal organization that ...READ MORE

Apr 14 in PMP by Naira
230 views
0 votes
1 answer

How do zero-day vulnerabilities impact security?

​Zero-day vulnerabilities are security flaws in software ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
406 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
171 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
172 views
0 votes
1 answer

How does AI predict the best scanning method for networks?

Artificial Intelligence (AI) enhances network scanning by ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
228 views
0 votes
1 answer

How can attackers exploit IPsec security associations?

​IPsec Security Associations (SAs) are fundamental to ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
186 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
183 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
176 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15 in PMP by Naira
176 views