Trending questions in Edureka Community

0 votes
1 answer

How do you manage microservice dependencies when updating different services?

Service Contracts and API Versioning: Microservices interact ...READ MORE

Nov 3 in DevOps Tools by Gagana
• 2,450 points
38 views
0 votes
0 answers

Is it possible to display combo box without the dropdown?

Can someone explain if it's feasible to ...READ MORE

Nov 4 in Cloud Computing by Priyanka
• 4,080 points
33 views
0 votes
0 answers

Unable to activate the Apex Language Server?

Can someone help me troubleshoot the issue ...READ MORE

Nov 4 in Cloud Computing by Priyanka
• 4,080 points
31 views
0 votes
1 answer

How do you eliminate bottlenecks causing delays in your delivery pipeline?

Streamlining delivery pipelines requires identifying and addressing ...READ MORE

Nov 3 in DevOps Tools by Gagana
• 2,450 points
35 views
0 votes
0 answers

How do you resolve auto-scaling issues in Kubernetes or AWS?

How do you resolve auto-scaling issues in ...READ MORE

Nov 3 in DevOps Tools by Anila
• 3,490 points
73 views
0 votes
0 answers

How do you manage complex drill-through reports when users encounter incorrect or missing data in drilldowns?

How do you manage complex drill-through reports ...READ MORE

Nov 4 in Power BI by Evanjalin
• 5,630 points
34 views
0 votes
0 answers

Is salesforce a good career?

I keep hearing about Salesforce jobs being ...READ MORE

Nov 4 in Cloud Computing by Priyanka
• 4,080 points
29 views
0 votes
1 answer

Which AWS certification is in demand?

If you're exploring AWS certifications, here are ...READ MORE

Nov 7 in AWS by roopa
110 views
0 votes
0 answers
0 votes
1 answer

How to prevent Client-Side XSS in JavaScript?

To prevent client-side XSS attacks in your ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
105 views
0 votes
1 answer

How to prevent brute force attacks using Node and Express.js?

To prevent brute-force attacks in a Node ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
100 views
0 votes
0 answers

How do you resolve issues when using DAX variables (VAR) that cause unexpected results in measures?

How do you resolve issues when using ...READ MORE

Nov 4 in Power BI by Evanjalin
• 5,630 points
29 views
0 votes
1 answer

How do you mitigate configuration drift in your IaC setup?

Configuration drift can be defined as when ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
91 views
0 votes
1 answer

How do you handle load balancing for dynamic microservices in cloud environments?

Dynamic microservices support flexible load balancing strategies ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
90 views
0 votes
0 answers

how do i publish to azure on power BI desktop?

how do i publish to azure on ...READ MORE

Nov 4 in Power BI by Evanjalin
• 5,630 points
28 views
0 votes
1 answer

What C or C++ libraries can help in developing custom security tools for ethical hacking?

Here are some C/C++ libraries commonly used ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
73 views
0 votes
1 answer

How to upgrade Node version in Windows?

 Download the Latest Installer Go to the Node.js ...READ MORE

Nov 6 in Web Development by kavya
95 views
0 votes
1 answer

What tools can I build in Ruby to automate penetration testing tasks?

Ruby is a versatile language that is ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
71 views
0 votes
1 answer

How do you troubleshoot slow build times in CI/CD pipelines?

Optimize build times in CI/CD pipelines as ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
83 views
0 votes
1 answer

What tools do you use for container security, and how do you integrate them into your DevOps pipeline?

Securing Containers: Tools and the integration with ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
78 views
0 votes
1 answer
0 votes
1 answer

What strategies do you use for secrets management across different environments in DevOps workflows?

Securing Secrets: It prevents unauthorized access to ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
77 views
0 votes
1 answer

Which is a fully managed desktop computing service in aws?

Amazon WorkSpaces is a fully managed desktop ...READ MORE

Nov 7 in AWS by Vaani
70 views
0 votes
1 answer

Is there a SHA that’s guaranteed to produce a unique hash?

No cryptographic hash function, including SHA, can ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
60 views
0 votes
1 answer

How to encrypt data that needs to be decrypted in Node.js?

To securely encrypt and decrypt data in ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
60 views
0 votes
1 answer

What SQL queries can be used to test for SQL injection vulnerabilities in a database?

When testing for SQL injection vulnerabilities, you ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
55 views
0 votes
1 answer

What challenges have you faced with automating database migrations, and how did you resolve them?

Database migration needs thorough planning to avoid ...READ MORE

Nov 4 in DevOps Tools by Gagana
• 2,450 points
70 views
0 votes
0 answers

What tools do you use to automate compliance checks in DevOps workflows?

What tools do you use to automate ...READ MORE

Nov 3 in DevOps Tools by Anila
• 3,490 points
43 views
0 votes
0 answers

How do you ensure consistency across environments (dev, test, prod) using IaC?

How do you ensure consistency across environments ...READ MORE

Nov 3 in DevOps Tools by Anila
• 3,490 points
43 views
0 votes
0 answers

How do you manage microservice dependencies when updating different services?

How do you manage microservice dependencies when ...READ MORE

Nov 3 in DevOps Tools by Anila
• 3,490 points
32 views
0 votes
1 answer

What is CIDR in AWS?

Let me explain CIDR (Classless Inter-Domain Routing) ...READ MORE

Nov 7 in AWS by Trivikram
54 views
0 votes
1 answer

What’s the best way to prevent clickjacking attacks on an Express.js-based web application?

To prevent clickjacking attacks on your Express.js ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,410 points
63 views
0 votes
1 answer
0 votes
1 answer

How to use logger in Java?

Loggers in Java are objects which trigger ...READ MORE

Nov 6 in Web Development by kavya
74 views
0 votes
1 answer

AWS vs Azure which is better for career?

When I first got interested in cloud ...READ MORE

Nov 7 in AWS by Raadhi
62 views
0 votes
1 answer

What’s the best project management tool for small teams?

The best project management tools for small ...READ MORE

Nov 3 in PMP by Vani
70 views
0 votes
1 answer

How to dynamically change meta tags before the site is scraped in Angular 2?

To dynamically change meta tags before Angular ...READ MORE

Nov 6 in Web Development by kavya
115 views
0 votes
1 answer

How to download key pair from aws?

Here, you can see how to download ...READ MORE

Nov 6 in AWS by Sam
68 views
0 votes
1 answer

How to add PNG image in HTML?

When inserting a PNG image into an ...READ MORE

Nov 4 in Web Development by kavya
68 views
0 votes
1 answer

How do you implement monitoring and alerting for multi-cloud environments?

Monitoring multi-cloud environments requires centralized tools and ...READ MORE

Nov 3 in DevOps Tools by Gagana
• 2,450 points
55 views
0 votes
1 answer

Can project managers work entirely remotely?

For Project Managers to work remotely depends ...READ MORE

Nov 3 in PMP by Ali
54 views
0 votes
1 answer

When choosing an AWS region, which factors should you consider?

When choosing an AWS region, keep these ...READ MORE

Nov 7 in AWS by Chetuzz
39 views
0 votes
1 answer

How to call invocable method from flow ?

To call an invocable method from a ...READ MORE

Nov 7 in OpenStack by Deepa
79 views
0 votes
1 answer

How to check AWS free tier expiry date?

To check the expiry date of your ...READ MORE

Nov 7 in AWS by Piyu
39 views