Trending questions in Edureka Community

0 votes
1 answer

How does MITRE ATT&CK framework help in vulnerability tracking?

The MITRE ATT&CK framework is a comprehensive ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
70 views
0 votes
1 answer

How do you define and manage lag and lead time in dependency-driven scheduling?

Lag and lead are time differences between ...READ MORE

Apr 14 in PMP by Naira
65 views
0 votes
1 answer

How does AI predict attack vectors in enumeration?

​AI enhances cybersecurity by predicting potential attack ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
70 views
0 votes
1 answer

How does IP fragmentation work?

​IP fragmentation is a mechanism used in ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
65 views
0 votes
1 answer

What are common false positives in vulnerability scanning?

Vulnerability scanners are essential for identifying potential ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
67 views
0 votes
1 answer

How do you use Configuration Management to track project scope changes?

Configuration Management (CM) manages project artifacts, documents, ...READ MORE

Apr 14 in PMP by Naira
61 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
52 views
0 votes
0 answers

How do you generate real-time project analytics using Google Looker Studio?

I’ve been experimenting with Google Looker Studio ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
57 views
0 votes
1 answer

How can Nmap be used by threat actors?

​Nmap (Network Mapper) is a powerful open-source ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
65 views
0 votes
1 answer

What are real-time monitoring tools for vulnerability detection?

Real-time vulnerability detection tools are essential for ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
64 views
0 votes
1 answer

What’s the best method for implementing a Change Control Board (CCB) process?

A CCB is a formal organization that ...READ MORE

Apr 14 in PMP by Naira
58 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
48 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
61 views
0 votes
1 answer

What is active vs passive enumeration, and when is each used?

Active vs. Passive Enumeration: Understanding the Differences ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
61 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
46 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
45 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

How do you perform S-Curve analysis for project financial performance?

The S-curve analysis measures cumulative cost, effort, ...READ MORE

Apr 14 in PMP by Naira
51 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
52 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
40 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
38 views
0 votes
0 answers
0 votes
0 answers

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Has anyone used Otter.ai to automate speech-to-text ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
44 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
68 views
0 votes
0 answers

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

We’re trying to get Jira tasks synced ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
43 views
0 votes
0 answers

What’s the best way to track scope creep metrics using Tableau or QlikView?

Scope creep is always tough to catch ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
43 views
0 votes
0 answers

How do you integrate Miro Boards with Jira for backlog refinement?

We use Miro for ideation and Jira ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
43 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,650 points
36 views
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,650 points
36 views
0 votes
0 answers

What’s the best way to track sprint velocity trends using Domo?

We’re using Domo and want to monitor ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
42 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,140 points
34 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,650 points
33 views
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
41 views
0 votes
0 answers

How do you set up webhooks in Asana for automated task updates?

I’d like to automate task updates in ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
38 views
0 votes
0 answers

How do you set up custom report automation in Smartsheet Control Center?

I’ve just started exploring Smartsheet Control Center ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
37 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,650 points
31 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,650 points
29 views
0 votes
0 answers

What is the CVSS base score, and how is it calculated?

The CVSS base score measures the severity ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
40 views
0 votes
0 answers

How do you configure KPI dashboards in Power BI for Project Management?

I’m setting up KPI dashboards in Power ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
32 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
32 views
0 votes
1 answer

What are the key features of OpenVAS vulnerability scanning?

OpenVAS (Open Vulnerability Assessment System) is an ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
159 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
47 views
+1 vote
3 answers

How to auto build a job in jenkins if there is any change in code on Github repository?

To automatically run build on code commit, follow ...READ MORE

Jul 31, 2019 in Jenkins by Sirajul
• 59,230 points
79,933 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
34 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
39 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
116 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
111 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
147 views