Trending questions in Edureka Community

0 votes
0 answers

How do I use GenAI for creating structured data from unstructured customer feedback?

Can you tell me How do I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 16,540 points
91 views
0 votes
1 answer

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

To effectively scan a system for open ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
119 views
0 votes
2 answers

What strategies would you use to flush a Power BI model without affecting usability?

To create a clear, readable matrix report ...READ MORE

Apr 1 in Power BI by anonymous
• 24,150 points
180 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
116 views
+1 vote
2 answers

How would you embed Power BI reports in an Angular application with Azure AD authentication?

To embed Power BI reports in an ...READ MORE

Mar 24 in Power BI by anonymous
• 24,150 points
287 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
115 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
166 views
0 votes
0 answers

SQL query for distinct professors and courses

There is a database on instructors, departments, ...READ MORE

Aug 26, 2022 in Database by Kithuzzz
• 38,000 points
24,091 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
82 views
0 votes
0 answers
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
118 views
0 votes
1 answer

What is the purpose of getters and setters in ECMAScript 6 classes?

Getters and setters are special functions within ...READ MORE

Feb 10 in Web Development by Navya
97 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
115 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
93 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
149 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
84 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
143 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
115 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
160 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
135 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
153 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
147 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
113 views
+1 vote
2 answers

How can you integrate a jQuery table into a Power BI environment?

There is some workaround that you need ...READ MORE

Dec 17, 2024 in Power BI by pooja
• 24,150 points
217 views
+1 vote
2 answers

How can you hide a column in Power BI while using a live connection?

While you work in Power BI using ...READ MORE

Dec 17, 2024 in Power BI by pooja
• 24,150 points
208 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
97 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes (like Lamport signatures, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
95 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
89 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
105 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
102 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
94 views
+1 vote
2 answers

How would you resolve an issue with incorrect totals in a Power BI report?

Here are steps on how to deal ...READ MORE

Dec 17, 2024 in Power BI by pooja
• 24,150 points
176 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
87 views
0 votes
2 answers

How can you customize the toolbar and add buttons in Power BI embedded reports?

You can customize the Power BI Embedded ...READ MORE

Mar 24 in Power BI by anonymous
• 24,150 points
202 views
+1 vote
2 answers

Is it possible to design a scheduler UI in Power BI, and if so, how?

Development of a personalized scheduler UI within ...READ MORE

Dec 13, 2024 in Power BI by pooja
• 24,150 points
233 views
+1 vote
2 answers

How can TypeScript and D3.js be used to create custom visuals in Power BI?

Making Custom Visuals in Power BI with ...READ MORE

Dec 13, 2024 in Power BI by pooja
• 24,150 points
228 views
0 votes
2 answers

What strategies can you use to handle the Power BI Gateway refresh limit?

Optimize Power BI Gateway refresh by using ...READ MORE

Mar 24 in Power BI by anonymous
• 24,150 points
246 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
68 views
0 votes
2 answers

How would you implement a FIFO data retention policy for a Power BI dataset?

Implement a FIFO data retention policy in ...READ MORE

Mar 24 in Power BI by anonymous
• 24,150 points
204 views
0 votes
2 answers

Can I use a single access token for multiple Power BI Embedded reports?

Yes, you can use a single access ...READ MORE

Mar 24 in Power BI by anonymous
• 31,450 points
153 views
0 votes
2 answers

What steps would you take to optimize a Power BI Desktop connection to a large data warehouse?

Optimize Power BI’s connection to a large ...READ MORE

Mar 24 in Power BI by anonymous
• 24,150 points
142 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
1,478 views
0 votes
0 answers

How can I determine if a string begins with another string?

With the help of code snippets, can ...READ MORE

Jan 9 in Java-Script by Ashutosh
• 29,650 points
130 views
0 votes
0 answers
0 votes
1 answer

What is the method to convert a floating-point number to an integer in JavaScript?

You can convert a floating-point number to ...READ MORE

Feb 7 in Java-Script by Navya
352 views
0 votes
0 answers

How do you negotiate scope changes without compromising project quality?

Scope changes are common in projects, but ...READ MORE

Jan 28 in PMP by Hoor
• 4,690 points
138 views
0 votes
0 answers

What’s your approach when a project is paused indefinitely?

How can project managers effectively handle the ...READ MORE

Jan 28 in PMP by Hoor
• 4,690 points
125 views
0 votes
0 answers

How do you address a lack of executive support for a project?

How can project managers effectively address this ...READ MORE

Jan 28 in PMP by Hoor
• 4,690 points
123 views
0 votes
0 answers

How do you determine if a project’s risk profile is too high?

How can project managers determine if the ...READ MORE

Jan 28 in PMP by Hoor
• 4,690 points
116 views
0 votes
0 answers

How do you handle divergent opinions on the project’s vision among stakeholders?

How can project managers address divergent opinions ...READ MORE

Jan 28 in PMP by Hoor
• 4,690 points
115 views