Trending questions in Edureka Community

0 votes
0 answers

How do you handle a situation where a team member disagrees with your project decisions?

How do you go about assessing risks ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
543 views
0 votes
0 answers

How can ethical hacking be used to protect IT systems and data?

Ethical hacking helps identify vulnerabilities before malicious ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
412 views
+1 vote
7 answers

What is difference between access modifier and access specifier in java

Access Specifier:- This can be understood as ...READ MORE

Feb 14, 2019 in Java by Priyaj
• 58,020 points
81,329 views
0 votes
1 answer

Removing Duplicate Transactions While Keeping the Latest Entry

An approach to eliminate duplicate transactions while ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
594 views
0 votes
0 answers

How do you ensure continuous risk monitoring throughout the project lifecycle?

How do you keep track of risks ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
367 views
0 votes
0 answers

What strategies do you use to communicate risks to stakeholders?

How do you communicate risks to stakeholders ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
366 views
0 votes
0 answers

How do you apply transform functions in PipeTransform Interface?

i want know with the help of ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
592 views
0 votes
0 answers

How to audit Active Directory security using PowerShell?

Active Directory security audits help identify misconfigurations ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
406 views
+1 vote
1 answer

How do I revert from using refresh policies with an EffectiveDate to using the current date in Tabular Editor 3?

To revert from using EffectiveDate to the ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
757 views
0 votes
0 answers

What are the tools for reconnaissance in Kali Linux?

Reconnaissance is the first phase of ethical ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
404 views
0 votes
0 answers

How would you handle a situation where key project stakeholders have conflicting objectives?

What would you do if key stakeholders ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
601 views
0 votes
0 answers

What is the best way to share services across Modules in angular2?

i want know with the help of ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
587 views
0 votes
0 answers

How to pass data from one service to another service in Angular?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
660 views
+1 vote
2 answers

How can I leverage Power BI's Copilot feature to accelerate the creation of dashboards and reports?

You can leverage Power BI's Copilot feature ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
810 views
0 votes
2 answers
0 votes
0 answers

How do Observables improve API call handling in Angular?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
657 views
0 votes
1 answer
0 votes
1 answer

Why are initial states undefined in React Native, or what causes this behavior?

In React Native (or React in general), ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,039 views
0 votes
0 answers

How does AI detect spam emails?

AI-driven spam detection analyzes email content, headers, ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
407 views
0 votes
0 answers

How to monitor Windows event logs using PowerShell?

Windows event logs provide crucial insights into ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
403 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,653 views
0 votes
0 answers

What are the techniques used in memory forensics?

Memory forensics helps investigate cyber threats by ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
392 views
+1 vote
1 answer

How can I retrieve data from a website that is powered by Power BI?

Accessing imported data from a website powered ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
744 views
0 votes
0 answers

How to do API security testing using Burp Suite?

Burp Suite is a powerful tool for ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
390 views
0 votes
0 answers

How to enforce PCI DSS compliance in web applications?

PCI DSS sets security standards for handling ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
562 views
0 votes
0 answers

What countermeasures prevent NFS share exploitation?

Misconfigured NFS shares can lead to unauthorized ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
306 views
0 votes
0 answers

How to test a threat intel Filebeat module rule in ELK?

The Filebeat module in ELK is used ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
395 views
0 votes
0 answers

How to improve threat intelligence?

Effective threat intelligence helps organizations detect and ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
385 views
0 votes
0 answers

How to check open ports in Python?

Scanning open ports helps identify network vulnerabilities ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
393 views
0 votes
0 answers

How can the MITRE ATT&CK framework be used in incident response?

The MITRE ATT&CK framework provides structured threat ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
383 views
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3, 2025 in Power BI by anonymous
• 36,180 points
641 views
0 votes
0 answers

How do you handle inconsistent training results in a GPT-3 model for email content generation?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
684 views
0 votes
0 answers

Why do we need to unsubscribe from observable?

Can you explain to me with an ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
564 views
0 votes
0 answers

How do you approach client dissatisfaction after project deliverables?

What’s the best way to handle a ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
733 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
764 views
+1 vote
1 answer

Why does ALLSELECTED in my DAX query return unexpected results, and how can I debug or fix it?

The ALLSELECTED function in DAX is used ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
726 views
0 votes
0 answers

How do you ensure projects align with evolving industry standards?

With industries always changing, how do you ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
573 views
0 votes
0 answers

Is there a way to detect keylogging software?

Keyloggers can silently record keystrokes, posing a ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
373 views
0 votes
0 answers

How can AI be used for automation?

AI-driven automation streamlines processes across industries, from ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
373 views
0 votes
0 answers

How do you detect a rootkit in Linux?

Rootkits are stealthy malware that can hide ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
372 views
0 votes
0 answers

How to generate an AES-GCM key?

AES-GCM (Galois/Counter Mode) provides strong encryption with ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
369 views
0 votes
0 answers

How to apply HIPAA security rules to healthcare encryption?

HIPAA regulations require strong encryption to protect ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
362 views
0 votes
0 answers

What type of operation do RxJS operators allow for observables?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
622 views
0 votes
0 answers

What’s the difference between pure and impure pipes?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
633 views
0 votes
0 answers
+1 vote
1 answer

What are the correct steps to set up Power BI with Amazon Redshift using an ODBC driver?

To integrate Power BI with Amazon Redshift ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
816 views
0 votes
0 answers

Do you need a Data Processing Agreement (DPA) for GDPR compliance?

Under GDPR, a Data Processing Agreement (DPA) ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
370 views
0 votes
0 answers

How can we protect against packet sniffing?

Packet sniffing allows attackers to capture and ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
760 views
0 votes
0 answers

How to create a zero-trust security model using segmentation?

Zero-trust security requires strict access control and ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
356 views
0 votes
0 answers

How do I set up 2FA with an authentication application (TOTP)?

Time-based One-Time Password (TOTP) authentication adds an ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
500 views