Trending questions in Edureka Community

0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
73 views
0 votes
0 answers

How do you navigate complex approval processes with multiple stakeholders?

I’m working on a project that needs ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
117 views
0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
114 views
0 votes
0 answers

How is enumeration used to gather information about a target?

Enumeration is a process used in cybersecurity ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
82 views
0 votes
1 answer

How to set a default base URL for all API calls in Angular?

In Angular, you can set a default ...READ MORE

Feb 26 in Angular by Kavya
166 views
0 votes
0 answers

What are examples of TCP and UDP in real-life scenarios?

TCP and UDP are widely used in ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
123 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
79 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
122 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
134 views
0 votes
0 answers

How do you determine key metrics for non-traditional project success?

How do you measure success for projects ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
107 views
0 votes
1 answer

What are the steps to import a SQL Server .BAK backup file into Power BI?

Power BI does not directly support importing ...READ MORE

Feb 27 in Power BI by anonymous
• 31,450 points
167 views
0 votes
0 answers

What is zero-trust security in access administration?

Zero-trust security follows the principle of "never ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
64 views
0 votes
0 answers

How does network scanning help in security assessments?

Network scanning is used to identify active ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
117 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
132 views
0 votes
0 answers

How do you handle communication issues with an international team?

I’m working with an international team, and ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
107 views
0 votes
0 answers

How do you handle over-dependence on a single key team member?

I’m managing a project where one team ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
105 views
0 votes
0 answers

What security measures protect against MITM attacks?

Man-in-the-Middle (MITM) attacks allow attackers to intercept ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
71 views
0 votes
1 answer

How do I configure MuleSoft’s Microsoft Power BI connector with OAuth authentication?

To securely connect MuleSoft to Power BI ...READ MORE

Feb 27 in Power BI by anonymous
• 31,450 points
162 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26 in Angular by Tanya
150 views
0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
107 views
0 votes
0 answers

How would you approach the unexpected introduction of a competitor product?

I'm working on a project, and out ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
120 views
0 votes
0 answers

How do you handle scenarios where a project faces prolonged resource shortages?

I’m managing a project that’s been dealing ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
119 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
92 views
0 votes
0 answers

How do you assess project viability if objectives remain uncertain?

How do you decide if a project ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
92 views
0 votes
0 answers

How do I apply Cosine Annealing for learning rate scheduling in Keras?

Can i know How do I apply ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
175 views
0 votes
0 answers

What’s your approach to maintaining transparency in high-risk projects?

I’m managing a high-risk project where things ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
91 views
0 votes
1 answer

What’s your approach when a project’s risk increases unexpectedly?

When there are sudden problems in a ...READ MORE

Feb 27 in PMP by Naira
115 views
0 votes
0 answers

What’s your approach to maintaining project quality during budget cuts?

I'm currently managing a project where we're ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
114 views
0 votes
1 answer

How to convert a Fetch API response to RxJS Observable?

To convert a Fetch API response into ...READ MORE

Feb 26 in Node-js by Kavya
140 views
0 votes
0 answers

How do you manage team expectations if the project scope is reduced?

How do you keep your team motivated ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
87 views
0 votes
0 answers

How does Nmap detect open ports on a network?

Nmap is a widely used tool for ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
94 views
0 votes
0 answers

How do you optimize resource allocation in a resource-constrained project?

How do you manage a project when ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
82 views
0 votes
1 answer

How can we add the style conditionally in Angular?

In Angular, you can add styles conditionally ...READ MORE

Feb 26 in Angular by Tanya
134 views
0 votes
0 answers

How does IP addressing work in computer networks?

IP addresses are used to identify devices ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
93 views
0 votes
1 answer

What is the difference between BrowserRouter and createBrowserRouter?

Feature BrowserRouter (React Router v5 & v6) createBrowserRouter (React ...READ MORE

Feb 23 in Node-js by Kavya
265 views
0 votes
0 answers
0 votes
0 answers

What’s your strategy for handling a major data breach during a project?

I'm leading a project, and one of ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
103 views
0 votes
0 answers

How do you manage critical interdependencies in complex projects?

I’m working on a complex project where ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
78 views
0 votes
0 answers
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
97 views
+1 vote
2 answers

How does Power BI Fabric enhance the presentation of insights compared to traditional Power BI dashboards and reports?

Power BI Fabric presents an enhanced experience ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,150 points

edited Mar 6 188 views
0 votes
1 answer

How to use ngIf with else?

You can use *ngIf with else to ...READ MORE

Feb 26 in Node-js by Navya
121 views
0 votes
1 answer

How do I fix a 401 unauthorized status code?

A 401 Unauthorized status code means the ...READ MORE

Feb 26 in Angular by Kavya
121 views
0 votes
1 answer

How to send multipart/form-data for a file upload in Angular?

In Angular, you can send files using ...READ MORE

Feb 24 in Angular by Navya
196 views
0 votes
0 answers

What’s the purpose of network architecture layers?

I know that network communication is structured ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
120 views
0 votes
0 answers

How do you handle team burnout in fast-paced project cycles?

How do you manage team burnout when ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
113 views
0 votes
1 answer

What are the correct steps to set up Power BI with Amazon Redshift using an ODBC driver?

To integrate Power BI with Amazon Redshift ...READ MORE

Feb 27 in Power BI by anonymous
• 31,450 points
122 views
0 votes
1 answer

How to remove components created with Angular-CLI?

To remove components created with Angular CLI, ...READ MORE

Feb 26 in Angular by Navya
114 views
0 votes
0 answers

How would you proceed if critical project data became inaccessible?

I've been thinking about how to handle ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
148 views