Trending questions in Edureka Community

0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
46 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
46 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
41 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
39 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
35 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
32 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
28 views
0 votes
0 answers

Is a router a better device for an IoT botnet than devices within its network?

I've read about IoT botnets and how ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
66 views
0 votes
0 answers

Can static IP addressing prevent IoT botnets?

I’ve read that some IoT botnets rely ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
59 views
0 votes
0 answers

Do I need a Gateway Firewall for an IoT network?

I’m setting up an IoT network and ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
59 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 63,600 points
36,453 views
0 votes
0 answers

Should the local network be checked first to access IoT devices?

I’ve noticed that some IoT devices prioritize ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
54 views
0 votes
0 answers

How do you secure IoT devices?

With IoT devices being common attack targets, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
51 views
0 votes
0 answers

How do you check whether the password is strong or not?

I want to ensure that passwords meet ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
49 views
0 votes
0 answers

How do I get a list of service accounts in Active Directory?

I need to list all service accounts ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
46 views
0 votes
0 answers

What are the negative aspects of creating fake security footprints?

I've heard about fake security footprints, where ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
38 views
0 votes
0 answers

How do I find unused service accounts in Active Directory?

Our AD environment contains several service accounts, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
28 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
26 views
0 votes
0 answers

How to exploit LDAP injection?

I'm studying LDAP injection for cybersecurity research ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 8,920 points
23 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
1,388 views
0 votes
1 answer

What is the method to convert a floating-point number to an integer in JavaScript?

You can convert a floating-point number to ...READ MORE

Feb 7 in Java-Script by Navya
257 views
0 votes
0 answers

How do you negotiate scope changes without compromising project quality?

Scope changes are common in projects, but ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
62 views
0 votes
0 answers

What’s your approach when a project is paused indefinitely?

How can project managers effectively handle the ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
61 views
0 votes
0 answers

How do you address a lack of executive support for a project?

How can project managers effectively address this ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
60 views
0 votes
0 answers

How do you handle divergent opinions on the project’s vision among stakeholders?

How can project managers address divergent opinions ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
60 views
0 votes
0 answers

How do you determine if a project’s risk profile is too high?

How can project managers determine if the ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
54 views
0 votes
0 answers

How do you foster cross-departmental collaboration on a complex project?

How can project managers foster effective cross-departmental ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
45 views
0 votes
0 answers

What’s your strategy for managing project fatigue in a long-term project?

In long-term projects, teams can experience fatigue, ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
43 views
0 votes
0 answers

How do you navigate ethical challenges in project decisions?

Project managers often face ethical dilemmas that ...READ MORE

Jan 28 in PMP by Hoor
• 4,670 points
30 views
0 votes
1 answer

How can I determine if a string begins with another string in JavaScript?

You can use the startsWith() method. Syntax: string.startsWith(searchString, position) Example: const ...READ MORE

Feb 7 in Java-Script by Navya
65 views
0 votes
1 answer

How can I iterate through keys and values in JavaScript?

In JavaScript , you can iterate through ...READ MORE

Feb 7 in Java-Script by Navya
63 views
0 votes
1 answer

Can you explain the concept of tail recursion?

Tail recursion is a specific form of ...READ MORE

Feb 7 in Java-Script by Navya
60 views
0 votes
1 answer

How can I assign a variable to hold a multiline string in JavaScript?

You can assign a variable to hold ...READ MORE

Feb 7 in Java-Script by Navya
58 views
0 votes
1 answer

What is the method to check if a JavaScript object is empty?

You can use several methods: 1. Using Object.keys() const ...READ MORE

Feb 7 in Java-Script by Navya
58 views
0 votes
1 answer

What does the new keyword do in JavaScript?

In JavaScript, the new keyword is used ...READ MORE

Feb 7 in Java-Script by Navya
55 views
0 votes
1 answer

How can I pass arguments to the callback function in setTimeout()?

You can pass arguments to the callback ...READ MORE

Feb 7 in Java-Script by Navya
53 views
0 votes
1 answer

What is the way to iterate over the properties of a plain JavaScript object?

You can iterate over the properties of ...READ MORE

Feb 7 in Java-Script by Navya
51 views
0 votes
1 answer

How do I check if a variable is undefined in JavaScript?

In JavaScript, you can check if a ...READ MORE

Feb 7 in Java-Script by Navya
51 views
0 votes
0 answers

What’s your approach to handling ongoing project delays due to supply chain issues?

Ongoing supply chain issues are causing repeated ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
62 views
0 votes
0 answers

How do you maintain focus when the project’s objectives change frequently?

Frequent changes in project objectives have been ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
55 views
0 votes
0 answers

How do you maintain focus when the project’s objectives change frequently?

Frequent changes in project objectives have been ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
55 views
0 votes
1 answer

Are there any security considerations when using R or Python scripts in Power BI?

Using R or Python scripts on Power BI has certain security risks , ...READ MORE

Jan 23 in Power BI by anonymous
• 13,230 points
57 views
0 votes
0 answers

How do you track progress when team members follow different project methodologies?

How can we create a unified tracking ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
50 views
0 votes
1 answer

How can I leverage R for advanced statistical analysis within Power BI reports?

Leverage R for Advanced Statistical Analysis in ...READ MORE

Jan 23 in Power BI by anonymous
• 13,230 points
52 views
0 votes
1 answer

Can I automate Power BI workflows, such as data refreshes or report updates, using Python?

Yes, you can automate Power BI workflows ...READ MORE

Jan 23 in Power BI by anonymous
• 13,230 points
52 views
0 votes
0 answers

What strategies do you use to de-escalate a project delay dispute?

What are the most effective strategies we ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
47 views
0 votes
0 answers

How would you manage a scenario where a major client demands early delivery?

A major client has requested an early ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
44 views
0 votes
0 answers

How would you proceed with project deliverables that are contingent on unreliable data?

We are facing a challenge where key ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
39 views
0 votes
0 answers

How do you establish a decision-making framework for a high-risk project?

We are currently handling a high-risk project ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
37 views
0 votes
0 answers

How do you balance autonomy with oversight in project team dynamics?

Our team often faces challenges in finding ...READ MORE

Jan 24 in PMP by Hoor
• 4,670 points
37 views