Trending questions in Edureka Community

0 votes
1 answer

How to handle asynchronous actions in Redux with Redux-Saga for complex data fetching scenarios?

To handle asynchronous actions in Redux for ...READ MORE

Mar 10 in Node-js by Tanvi
57 views
0 votes
0 answers

What strategies do you use to communicate risks to stakeholders?

How do you communicate risks to stakeholders ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
46 views
0 votes
1 answer

Passing a 2D array to a C++ function

How to pass 2D array to a ...READ MORE

Oct 13, 2023 in C++ by Artp

edited Mar 5 31,652 views
0 votes
1 answer

How do I handle many-to-many relationships in Power BI without creating ambiguous relationships in the model?

Best practices concerning model management should be ...READ MORE

Mar 10 in Power BI by anonymous
• 24,110 points
56 views
0 votes
0 answers

How do you balance risk mitigation with project constraints like time and budget?

How do you find the right balance ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
44 views
0 votes
0 answers

How would you integrate a new team member into an ongoing project?

How do you get a new team ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
44 views
0 votes
1 answer

I need to compute a year-over-year (YoY) growth rate but only for months where I have data in both years—how do I do this?

Calculating Year-over-Year (YoY) growth only for those ...READ MORE

Mar 10 in Power BI by anonymous
• 24,110 points
55 views
0 votes
1 answer

How do you use L1 regularization with Logistic Regression in Scikit-learn for feature selection?

You can use L1 regularization with LogisticRegression ...READ MORE

Mar 18 in Generative AI by anonymous
• 24,010 points
46 views
0 votes
1 answer

How to Handle Blocking Threads in a Ruby Chat Server for Server Commands?

To handle blocking threads in a Ruby ...READ MORE

Mar 10 in Node-js by Tanvi
50 views
0 votes
0 answers

How do you ensure stakeholder engagement throughout the project?

What’s your strategy for keeping stakeholders engaged ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
39 views
0 votes
1 answer

How can I optimize a SUMX() function that is performing poorly on large datasets?

To optimize a SUMX() function for large ...READ MORE

Mar 10 in Power BI by anonymous
• 24,110 points
49 views
0 votes
1 answer

How can I reduce the memory usage of a complex DAX calculation that involves multiple SUMX() iterations?

To reduce memory usage in a complex ...READ MORE

Mar 10 in Power BI by anonymous
• 24,110 points
47 views
0 votes
0 answers

How would you handle a situation where a stakeholder is not satisfied with the project deliverables?

What would you do if a stakeholder ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
35 views
0 votes
0 answers

What steps would you take if a key stakeholder is unresponsive?

How would you deal with a key ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
31 views
0 votes
0 answers

How do you ensure continuous risk monitoring throughout the project lifecycle?

How do you keep track of risks ...READ MORE

Mar 11 in PMP by Parshvi
• 3,660 points
29 views
0 votes
0 answers

How to get the NetBIOS name of a computer?

NetBIOS names help identify devices on a ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
66 views
0 votes
0 answers

How to find the IP address of the DNS server in Wireshark?

Wireshark is a powerful network analysis tool. ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
59 views
0 votes
0 answers

How to audit Active Directory security using PowerShell?

Active Directory security audits help identify misconfigurations ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 13,180 points
58 views
0 votes
0 answers

How can ethical hacking be used to protect IT systems and data?

Ethical hacking helps identify vulnerabilities before malicious ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
50 views
0 votes
0 answers

How to do API security testing using Burp Suite?

Burp Suite is a powerful tool for ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 13,180 points
51 views
0 votes
0 answers

What are the tools for reconnaissance in Kali Linux?

Reconnaissance is the first phase of ethical ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
46 views
0 votes
0 answers

How to implement a web application firewall (WAF) using ModSecurity?

ModSecurity is an open-source WAF used to ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
46 views
0 votes
0 answers

Is there a way to detect keylogging software?

Keyloggers can silently record keystrokes, posing a ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
44 views
0 votes
0 answers

What are the techniques used in memory forensics?

Memory forensics helps investigate cyber threats by ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
44 views
0 votes
0 answers

How to improve threat intelligence?

Effective threat intelligence helps organizations detect and ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
44 views
0 votes
0 answers

How to perform WHOIS lookup for domain analysis?

WHOIS lookup provides critical information about domain ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
42 views
0 votes
0 answers

What is the impact of NetBIOS null session in hacking?

NetBIOS null sessions allow unauthorized access to ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
39 views
0 votes
0 answers

How to monitor Windows event logs using PowerShell?

Windows event logs provide crucial insights into ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
51 views
0 votes
0 answers

How to validate TLS certificates using Python?

TLS certificates ensure secure communication over networks. ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
35 views
0 votes
0 answers

How to check open ports in Python?

Scanning open ports helps identify network vulnerabilities ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
46 views
0 votes
0 answers

How to test a threat intel Filebeat module rule in ELK?

The Filebeat module in ELK is used ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
45 views
0 votes
0 answers

Should the server send secure cookies on an unsecured HTTP response?

Secure cookies are designed to be sent ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
44 views
0 votes
0 answers

How do you detect a rootkit in Linux?

Rootkits are stealthy malware that can hide ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 13,180 points
32 views
0 votes
0 answers

How to implement GDPR-compliant data anonymization in Python?

Data anonymization is essential for GDPR compliance ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
32 views
0 votes
0 answers

Can you reverse engineer malware?

Reverse engineering malware helps in analyzing threats ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
29 views
0 votes
0 answers

How to create a zero-trust security model using segmentation?

Zero-trust security requires strict access control and ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 13,180 points
30 views
0 votes
0 answers

How can the MITRE ATT&CK framework be used in incident response?

The MITRE ATT&CK framework provides structured threat ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Nidhi
• 13,180 points
30 views
0 votes
0 answers

How can AI be used for automation?

AI-driven automation streamlines processes across industries, from ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
28 views
0 votes
0 answers

How to generate an AES-GCM key?

AES-GCM (Galois/Counter Mode) provides strong encryption with ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
27 views
0 votes
1 answer

How do I deploy a Keras model in production and monitor its performance over time?

Deploy a Keras model using a Flask ...READ MORE

Mar 19 in Generative AI by nini
94 views
0 votes
0 answers

How to deny IP ranges with UFW?

Uncomplicated Firewall (UFW) is a user-friendly firewall ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
22 views
0 votes
0 answers

How to apply HIPAA security rules to healthcare encryption?

HIPAA regulations require strong encryption to protect ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
22 views
0 votes
0 answers

How to detect DNS tunneling using Python?

DNS tunneling is a covert method used ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
24 views
0 votes
0 answers

How to check for CORS misconfiguration in an API using a script?

Cross-Origin Resource Sharing (CORS) misconfigurations can expose ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
32 views
0 votes
0 answers

How to build an AI-powered intrusion detection system?

AI can enhance intrusion detection by identifying ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
31 views
0 votes
0 answers

How to enforce SOX compliance for security improvements?

The Sarbanes-Oxley Act (SOX) mandates strict security ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
21 views
0 votes
0 answers

How does AI detect spam emails?

AI-driven spam detection analyzes email content, headers, ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
30 views
0 votes
0 answers

Do you need a Data Processing Agreement (DPA) for GDPR compliance?

Under GDPR, a Data Processing Agreement (DPA) ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
26 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7 in Power BI by anonymous
• 24,110 points
99 views