Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

Write a script to scale the training of a foundation model using Horovod and mixed precision training.

Can i know Write a script to ...READ MORE

2 days ago in Generative AI by Nidhi
• 13,600 points
21 views
0 votes
0 answers

How to design a landing page with a full-width background image in Bootstrap 3?

With the help of code can i ...READ MORE

2 days ago in Node-js by Nidhi
• 13,600 points
15 views
0 votes
0 answers
0 votes
0 answers

How can we fix the width of the container in Bootstrap?

Can i know How can we fix ...READ MORE

1 day ago in Node-js by Ashutosh
• 24,610 points
10 views
0 votes
0 answers

How can I validate a form that i had created using bootstrap 3?

Can you tell me How can I ...READ MORE

1 day ago in Node-js by Ashutosh
• 24,610 points
9 views
0 votes
0 answers
0 votes
0 answers

How would you set up a CI/CD pipeline for deploying an LLM model on AWS SageMaker?

With the help of code can you ...READ MORE

2 days ago in Generative AI by Ashutosh
• 24,610 points
12 views
0 votes
0 answers

How would you secure an LLM inference API using OAuth 2.0 and restrict access to authorized clients?

Can i know How would you secure ...READ MORE

2 days ago in Generative AI by Ashutosh
• 24,610 points
11 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How can you trust a forensic scientist to have maintained the chain of custody?

Maintaining the chain of custody is essential ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
16 views
0 votes
0 answers
0 votes
0 answers

How to do bug bounty hunting?

Bug bounty programs reward security researchers for ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
15 views
0 votes
0 answers

How can I keep the virtual keyboard up after a user clicks SEND, which makes an API call?

Can you tell me How can I ...READ MORE

2 days ago in Node-js by Nidhi
• 13,600 points
12 views
0 votes
0 answers

Explain with code how to use LLamaIndex's callback manager to log the details of each query execution.

With the help of proper code example ...READ MORE

2 days ago in Generative AI by Ashutosh
• 24,610 points
7 views
0 votes
0 answers
0 votes
0 answers

Write a program to compare the performance of two foundation models on the GLUE benchmark.

Can i know Write a program to ...READ MORE

2 days ago in Generative AI by Nidhi
• 13,600 points
12 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

Write code to train a causal language model using masked language modeling (MLM) objectives.

With the help of code, can you ...READ MORE

2 days ago in Generative AI by Nidhi
• 13,600 points
10 views
0 votes
1 answer

How do you inspire your team to stay motivated throughout the project?

The success of long-term projects mostly depends ...READ MORE

2 days ago in PMP by Naira
42 views
0 votes
1 answer

What are the best ways to foster collaboration in project teams?

Successful projects rely on strong teamwork. I ...READ MORE

2 days ago in PMP by Naira
42 views
0 votes
1 answer

How do you balance strategic thinking with day-to-day project execution?

Managing the wide vision with execution calls ...READ MORE

2 days ago in PMP by Naira
41 views
0 votes
1 answer

How do you handle personal conflicts between team members?

Unresolved Problems Can Set Projects Backfire. My ...READ MORE

2 days ago in PMP by Naira
41 views
0 votes
1 answer

What skills make a project manager successful?

A Successful PM Balances Soft and Technical ...READ MORE

2 days ago in PMP by Naira
40 views
0 votes
1 answer

How do you handle stress and pressure in project management?

Project managers often face tight deadlines and ...READ MORE

2 days ago in PMP by Naira
34 views
0 votes
1 answer

What’s the importance of emotional intelligence in project management?

Managing teams and stakeholders under pressure requires ...READ MORE

2 days ago in PMP by Naira
33 views
0 votes
1 answer

How do you build a strong project management culture in an organization?

Creating a sustainable project management culture requires ...READ MORE

2 days ago in PMP by Naira
33 views
0 votes
1 answer

How does ransomware store its decryption keys?

​Ransomware operates by encrypting a victim's files ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
68 views
0 votes
1 answer

How do you ensure Active Directory data privacy in an organization?

​Active Directory (AD) is a central component ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
67 views
0 votes
1 answer

How do you configure Active Directory for compliance with GDPR?

To configure Active Directory (AD) for compliance ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
62 views
0 votes
1 answer

Does a Risk Management approach work in Cybersecurity?

A risk management approach is fundamental to ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
54 views
0 votes
1 answer

Is sending PHI via email a HIPAA violation?

​Emailing Protected Health Information (PHI) can be ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
37 views
0 votes
1 answer

Does HIPAA require database encryption?

​The Health Insurance Portability and Accountability Act ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
32 views
0 votes
1 answer

What are the PCI DSS requirements for SSL/TLS certificates?

​The Payment Card Industry Data Security Standard ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
59 views
0 votes
1 answer

How to mock HttpClient in unit tests using Angular's HttpTestingController?

To mock HttpClient in unit tests using ...READ MORE

Mar 26 in Node-js by anonymous
89 views
0 votes
1 answer

Is encryption in transit distinct from end-to-end encryption?

​Encryption in transit and end-to-end encryption (E2EE) ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
55 views
0 votes
1 answer

Is AWS S3 PCI compliant?

​Amazon Simple Storage Service (S3) is assessed ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
54 views
0 votes
1 answer

Is tokenized data subject to PCI DSS compliance requirements?

​Tokenization is a data security technique that ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
53 views
0 votes
0 answers

Why use a firewall on your router?

A firewall adds a layer of security ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
48 views
0 votes
1 answer

Is TLS encryption enough for HIPAA?

​Transport Layer Security (TLS) is a widely ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
46 views
0 votes
1 answer

What are the key requirements for achieving PCI-DSS compliance?

​The Payment Card Industry Data Security Standard ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
43 views
0 votes
1 answer

How does PCI DSS compliance apply to Memcached usage?

​The Payment Card Industry Data Security Standard ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
41 views
0 votes
1 answer

What are 3 top challenges of PCI compliance that an organization can have?

Achieving and maintaining PCI DSS (Payment Card ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,220 points
31 views