Trending questions in Edureka Community

0 votes
0 answers

What is the Cyber Kill Chain often used to analyze an attacker’s methods?

The Cyber Kill Chain outlines the stages ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
135 views
0 votes
0 answers

Why do we need to unsubscribe from observable?

Can you explain to me with an ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
147 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5 79,412 views
0 votes
1 answer

Why is the RLS role not being applied when executing queries via the Power BI REST API using PowerShell, and how can I fix it?

RLS roles may not be applied when ...READ MORE

Feb 28 in Power BI by anonymous
• 33,070 points
347 views
0 votes
0 answers

Is Lean Six Sigma still relevant or is it dated?

In your opinion, is Lean Six Sigma ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
156 views
+1 vote
2 answers

Is it possible to extract Power BI metadata (e.g., dataset lineage) using Azure Data Factory?

Yes, you can extract typical metadata from ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
313 views
0 votes
0 answers

How to hash passwords using bcrypt in Node.js?

Bcrypt is a popular hashing algorithm for ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
177 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Angular by Nidhi
• 16,140 points
135 views
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
122 views
0 votes
0 answers

How do you manage differing levels of project experience within a team?

I’m wondering how to manage a team ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
147 views
0 votes
0 answers

How do Observables improve API call handling in Angular?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
204 views
+1 vote
2 answers
0 votes
0 answers

How do you deal with errors in Observables?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
200 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
113 views
0 votes
0 answers

Can cybersecurity be automated by AI?

AI is increasingly being integrated into cybersecurity ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
127 views
0 votes
1 answer
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
123 views
0 votes
0 answers

What’s your approach to managing remote teams with limited oversight?

I’m curious about how people manage remote ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
156 views
0 votes
0 answers

How would you proceed if critical regulatory approval is delayed?

If you had to deal with a ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
155 views
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
152 views
0 votes
0 answers

How to detect unauthorized USB device insertion?

Unauthorized USB devices can pose serious security ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
106 views
0 votes
0 answers

How to use Angular services to share data between components?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
190 views
0 votes
0 answers

What’s your approach to meeting a sudden reduction in project timeline?

If the project timeline gets cut short ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
147 views
0 votes
1 answer

Why am I unable to update Delta Live Tables, and what troubleshooting steps can I take to resolve the issue?

Well, in the case that you are ...READ MORE

Mar 3 in Power BI by anonymous
• 33,070 points
187 views
0 votes
0 answers

How do I call an Angular 2 pipe with multiple arguments?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
198 views
0 votes
1 answer

Is there a way in Power BI Desktop to transform multiple text column values into a single row, grouped by another column?

Yes, you can transform multiple text values ...READ MORE

Mar 3 in Power BI by anonymous
• 33,070 points
184 views
0 votes
0 answers

When should we use providedIn: ‘root’ vs ‘module’ for services?

I was hoping you could explain to ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
182 views
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3 in Power BI by anonymous
• 33,070 points
182 views
0 votes
0 answers

How can we combine multiple built-in pipes in Angular templates?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
194 views
0 votes
0 answers

How do you prioritize when multiple projects have high ROI potential?

When faced with multiple projects that all ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
140 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
140 views
0 votes
0 answers

How do you implement KMeans clustering with MiniBatchKMeans for large datasets in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 32,730 points
225 views
0 votes
0 answers

How do you handle inconsistent training results in a GPT-3 model for email content generation?

With the help of code can you ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,140 points
221 views
0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
138 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
140 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
133 views
+1 vote
2 answers

How can I filter a dataset in Power BI to show records where a date column is less than the slicer value?

Filtering a dataset in Power BI to ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
272 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
131 views
+1 vote
6 answers

What best practices do you follow for data validation and audit trails in Power BI solutions?

Audit trails and data validation play a ...READ MORE

Nov 28, 2024 in Power BI by pooja
• 24,450 points
432 views
0 votes
0 answers

What’s the difference between BehaviorSubject and Subject?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
171 views
0 votes
0 answers

How do I implement salt into my login for passwords?

Salting enhances password security by adding randomness ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
135 views
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
138 views
0 votes
0 answers

How do you diagnose an injector fault?

Explain me with the help of an ...READ MORE

Mar 3 in Java-Script by Nidhi
• 16,140 points
169 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
181 views
0 votes
0 answers
0 votes
0 answers

What’s the difference between pure and impure pipes?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
178 views
0 votes
0 answers
0 votes
0 answers

How do you ensure that all project requirements are gathered and documented effectively?

What’s your process for making sure all ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
126 views