Trending questions in Edureka Community

0 votes
0 answers

What are the key differences between AWS EFS and S3, and when should I use each?

Basically, I want to know how these ...READ MORE

Oct 16 in AWS by Priyanka
• 4,080 points
166 views
0 votes
1 answer

How can I resolve the 'instance reachability check failed' issue on an Ubuntu AWS instance?

First, I checked the System Logs to ...READ MORE

Oct 17 in AWS by Tanu
94 views
0 votes
1 answer

What strategies do you use to optimize build times in your CI/CD pipelines, including any specific coding solutions?

Among other strategies to optimize build times ...READ MORE

Oct 17 in DevOps & Agile by Gagana
• 2,450 points
114 views
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
94 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
85 views
0 votes
1 answer

How to memorize pmp inputs and outputs?

According to my personal experience, Memorizing inputs ...READ MORE

Oct 18 in PMP by Ali

edited Oct 21 by Hoor 77 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
76 views
0 votes
1 answer

What are your go-to scripting languages for automating CI/CD pipelines, and can you share a sample script?

A general script automation choice in CI/CD ...READ MORE

Oct 16 in DevOps Tools by Gagana
• 2,450 points
168 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
64 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
63 views
0 votes
0 answers

Best way to combine multiple file with multiple same tabs?

Best way to combine multiple file with ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
174 views
0 votes
1 answer

How much experience is required for pmp certification?

The experience needed for PMP certification really ...READ MORE

Oct 15 in PMP by Ali
113 views
0 votes
0 answers
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
155 views
0 votes
1 answer

How to remember inputs and outputs for pmp exam?

Remembering inputs and outputs for the PMP ...READ MORE

Oct 15 in PMP by Priya
82 views
0 votes
0 answers

How to memorize pmp processes?

How to memorize pmp processes? READ MORE

Oct 14 in PMP by Hoor
• 2,520 points
143 views
0 votes
0 answers

How to migrate SVN large size repository (~1.4TB) into GIT

Migrating a large SVN repository (around 1.4TB) ...READ MORE

Oct 15 in DevOps Tools by Anila
• 3,490 points
74 views
0 votes
0 answers

How can I optimize the performance of my React app when dealing with a large amount of data?

How can I optimize the performance of ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points
116 views
0 votes
0 answers

How do I send a file from postman to node.js with multer?

How do I send a file from ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points
112 views
0 votes
1 answer

How do you manage environment variables in your DevOps processes, and what coding techniques have you found effective?

In DevOps processes, maintain environment variables that ...READ MORE

Oct 16 in DevOps Tools by Gagana
• 2,450 points

edited Oct 18 by Hoor 96 views
0 votes
0 answers

What are the best practices for creating responsive layouts and custom themes in Power BI reports?

What are the best practices for creating ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
108 views
0 votes
0 answers

How to combine different versions of Application and Firmware Software during continuous deployment?

The question "How to combine different versions ...READ MORE

Oct 15 in DevOps Tools by Anila
• 3,490 points
61 views
0 votes
0 answers

Power BI published to web reports are extremely slow to load.How we can fix this?

Power BI published to web reports are ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
106 views
0 votes
0 answers

How do I implement custom aggregations in Power BI using DAX?

How do I implement custom aggregations in ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
102 views
0 votes
0 answers

How To Explain Your Project In An Interview?

What points should I keep in mind ...READ MORE

Oct 15 in PMP by Hoor
• 2,520 points

edited Oct 23 by Hoor 64 views
0 votes
0 answers

Is there a good guideline for continuous integration of a large web application?!

Are best practices defined for setting up ...READ MORE

Oct 14 in DevOps Tools by anonymous
• 3,490 points

edited Oct 22 by anonymous 109 views
0 votes
0 answers

Why is my brute-force attack on a web application failing after a few attempts?

Why is my brute-force attack on a ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
103 views
0 votes
0 answers

What are your favorite Marketplace apps and integrations for DevOps?

DevOps marketplaces offer a variety of apps ...READ MORE

Oct 15 in DevOps Tools by Anila
• 3,490 points
46 views
0 votes
0 answers

How can I sort my pre-conditions by execution in an automated test?

The question "How would I sort my ...READ MORE

Oct 15 in DevOps Tools by Anila
• 3,490 points
45 views
0 votes
0 answers

what can the skills developed by cybersecurity professionals be used for?

what can the skills developed by cybersecurity ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
96 views
0 votes
0 answers

What are effective methods for version control and deployment of Power BI reports?

What are effective methods for version control ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
88 views
0 votes
0 answers

How to get 60 pdus for pmp renewal?

How to get 60 pdus for pmp ...READ MORE

Oct 14 in PMP by Hoor
• 2,520 points
101 views
0 votes
0 answers

What are the DevOps implementation challenges at your organization?

What specific issues were you facing in ...READ MORE

Oct 14 in DevOps Tools by anonymous
• 3,490 points

edited Oct 25 by anonymous 96 views
0 votes
0 answers

Where to send bug report for Power BI Desktop?

Where to send bug report for Power ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
85 views
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
83 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
83 views
0 votes
0 answers
0 votes
0 answers

How can I create dynamic parameters in Power BI using DAX?

How can I create dynamic parameters in ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
73 views
0 votes
0 answers

How do you implement an infinite scrolling list in React?

How do you implement an infinite scrolling ...READ MORE

Oct 11 in Web Development by anonymous
• 2,660 points

edited Oct 14 by Hoor 202 views
0 votes
0 answers

How to upload a file to api server in node js?

How to upload a file to api ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points
68 views
0 votes
0 answers

Should I load and store JSON data with a copy for my whole react application in Redux or somewhere else?

Should I load and store JSON data ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points

edited Oct 14 by Hoor 67 views
0 votes
0 answers

Can hackers hide their info from netstat?

Can hackers hide their info from netstat? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
75 views
0 votes
0 answers

What are the main weaknesses of Bitbucket Cloud compared to GitHub in your opinion?

What do you see as the weaknesses ...READ MORE

Oct 14 in DevOps Tools by anonymous
• 3,490 points

edited Oct 22 by anonymous 75 views
0 votes
0 answers

How do you implement role-based access control (RBAC) in a full stack application?

How do you implement role-based access control ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points
64 views
0 votes
0 answers

Adding weekly start date & end date to my date table based on week number?

Adding weekly start date & end date ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
63 views
0 votes
0 answers

How to manage file size and multiple numeric what-if parameters?

How to manage file size and multiple ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
62 views
0 votes
0 answers

What are Best Practices for preventing SQL injection in node-mysql?

What are Best Practices for preventing SQL ...READ MORE

Oct 14 in Web Development by anonymous
• 2,660 points
58 views
0 votes
0 answers

How can I use R or Python scripts within Power BI for advanced data analysis?

How can I use R or Python ...READ MORE

Oct 14 in Power BI by anonymous
• 5,630 points
53 views
0 votes
0 answers

How do I evade detection while using a VPN during an attack?

How do I evade detection while using ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
61 views
0 votes
0 answers

How do I find and exploit an insecure API endpoint in a mobile app?

How do I find and exploit an ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,950 points
61 views