Trending questions in Edureka Community

0 votes
0 answers

How can ethical hacking be used to protect IT systems and data?

Ethical hacking helps identify vulnerabilities before malicious ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
71 views
0 votes
0 answers

How to detect DNS tunneling using Python?

DNS tunneling is a covert method used ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
73 views
0 votes
0 answers

What are the tools for reconnaissance in Kali Linux?

Reconnaissance is the first phase of ethical ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
72 views
0 votes
0 answers

What are the techniques used in memory forensics?

Memory forensics helps investigate cyber threats by ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
71 views
0 votes
0 answers

How to check open ports in Python?

Scanning open ports helps identify network vulnerabilities ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
78 views
0 votes
0 answers

How to perform WHOIS lookup for domain analysis?

WHOIS lookup provides critical information about domain ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
68 views
0 votes
0 answers

Why is the bin folder missing after installing MongoDB on Windows 7 64-bit?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Node-js by Nidhi
• 16,340 points
210 views
0 votes
0 answers

How to validate TLS certificates using Python?

TLS certificates ensure secure communication over networks. ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
64 views
+1 vote
2 answers

What are the steps to integrate Python scripts into Power BI for data transformation or visualization?

To include Python scripts in Power BI for data transformation or ...READ MORE

Jan 23 in Power BI by anonymous
• 23,870 points
141 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7 in Power BI by anonymous
• 30,660 points
151 views
0 votes
0 answers

How can the MITRE ATT&CK framework be used in incident response?

The MITRE ATT&CK framework provides structured threat ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 16,340 points
63 views
0 votes
0 answers

How to implement GDPR-compliant data anonymization in Python?

Data anonymization is essential for GDPR compliance ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
63 views
0 votes
0 answers

How to test a threat intel Filebeat module rule in ELK?

The Filebeat module in ELK is used ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
71 views
+1 vote
2 answers

How can I expose a custom query as a reusable view in an existing Power BI dashboard?

The steps to make customizable queries towards ...READ MORE

Jan 23 in Power BI by pooja
• 23,870 points
138 views
0 votes
1 answer

How can I create a dynamic date range filter that automatically adjusts based on user-selected slicer values?

To create a dynamic date range filter ...READ MORE

Mar 7 in Power BI by anonymous
• 30,660 points
147 views
+1 vote
2 answers
0 votes
0 answers

How to check for CORS misconfiguration in an API using a script?

Cross-Origin Resource Sharing (CORS) misconfigurations can expose ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
68 views
0 votes
1 answer

How do I deploy a Keras model in production and monitor its performance over time?

Deploy a Keras model using a Flask ...READ MORE

Mar 19 in Generative AI by nini
125 views
0 votes
0 answers

How to build an AI-powered intrusion detection system?

AI can enhance intrusion detection by identifying ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
66 views
0 votes
0 answers

Should the server send secure cookies on an unsecured HTTP response?

Secure cookies are designed to be sent ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
66 views
+1 vote
2 answers

How can I retrieve a mapped value from a many-to-one related table in Power BI when using DirectQuery mode?

Get the associated values per multiple linked ...READ MORE

Jan 23 in Power BI by pooja
• 23,870 points
132 views
0 votes
0 answers

How to create a zero-trust security model using segmentation?

Zero-trust security requires strict access control and ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 16,340 points
54 views
0 votes
0 answers

How do you detect a rootkit in Linux?

Rootkits are stealthy malware that can hide ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 16,340 points
53 views
0 votes
0 answers

How can AI be used for automation?

AI-driven automation streamlines processes across industries, from ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
52 views
0 votes
0 answers

How does AI detect spam emails?

AI-driven spam detection analyzes email content, headers, ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
61 views
0 votes
0 answers

How to generate an AES-GCM key?

AES-GCM (Galois/Counter Mode) provides strong encryption with ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
51 views
0 votes
0 answers

Can you reverse engineer malware?

Reverse engineering malware helps in analyzing threats ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
47 views
0 votes
0 answers

How to deny IP ranges with UFW?

Uncomplicated Firewall (UFW) is a user-friendly firewall ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
46 views
+1 vote
2 answers

What processes occur internally in Power BI when a relationship is created between two tables?

When a relationship is created between two ...READ MORE

Jan 23 in Power BI by pooja
• 23,870 points
122 views
0 votes
1 answer

I need to calculate a running total but reset it at the start of each new quarter—how can I achieve this in DAX?

To calculate a running total that resets ...READ MORE

Mar 7 in Power BI by anonymous
• 30,660 points
132 views
0 votes
0 answers

How to enforce SOX compliance for security improvements?

The Sarbanes-Oxley Act (SOX) mandates strict security ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
44 views
0 votes
0 answers

How to apply HIPAA security rules to healthcare encryption?

HIPAA regulations require strong encryption to protect ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
41 views
0 votes
1 answer

How do I navigate to previous page in React using useNavigate?

In React, you can navigate to the ...READ MORE

Mar 7 in Angular by Tanvi
130 views
0 votes
0 answers

Do you need a Data Processing Agreement (DPA) for GDPR compliance?

Under GDPR, a Data Processing Agreement (DPA) ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
49 views
0 votes
1 answer
0 votes
1 answer

Cannot find name webgl object TypeScript issue TS2304.

The error Cannot find name 'WebGLObject'. TS2304 ...READ MORE

Mar 6 in Angular by Anvi
178 views
+1 vote
2 answers

Why is the "Visual" tab missing in the formatting pane for a custom visual in Power BI?

The custom visual loses the "Visual" tab ...READ MORE

Jan 8 in Power BI by pooja
• 23,870 points
244 views
0 votes
1 answer

Why am I getting an "SSL Certificate Chain Not Trusted" error when connecting SQL Server to Power BI, and how do I resolve it?

The "SSL Certificate Chain Not Trusted" error ...READ MORE

Feb 28 in Power BI by anonymous
• 30,660 points
380 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

How to install Jest and React Testing Library in TypeScript?

To install and configure Jest and React ...READ MORE

Mar 6 in Java-Script by Anvi
123 views
0 votes
1 answer

Is Page Refresh Necessary for Route Re-Load in ReactJS?

No, a page refresh is not necessary ...READ MORE

Mar 6 in Java-Script by Anvi
121 views
0 votes
1 answer

Handling Text-Based Date Columns with Errors in Power Query

To correctly transform a text-based date column ...READ MORE

Mar 5 in Power BI by anonymous
• 30,660 points
160 views
0 votes
1 answer

How to create a mat table in Angular?

1. Install Angular Material ng add @angular/material 2. Import ...READ MORE

Mar 6 in Angular by Anvi
117 views
0 votes
0 answers

How does YARA rule detect malware?

YARA rules are used for identifying malware ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
117 views
0 votes
0 answers

How is metadata used in forensics?

Metadata contains hidden details about files, such ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
117 views
0 votes
1 answer

How to get last visited page URL in React?

To get the last visited page URL ...READ MORE

Mar 6 in Angular by Anvi
113 views
0 votes
0 answers

Why Isn't the MongoDB Extension Loading in PHP Despite Following Installation Steps?

Can someone exlpain me with the code ...READ MORE

Mar 6 in PHP by Nidhi
• 16,340 points
150 views