Trending questions in Edureka Community

0 votes
0 answers

How to identify privilege escalation attempts in Linux logs?

I need to monitor Linux logs for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
511 views
0 votes
0 answers

How would you proceed if you identify a skills gap too late in a project?

You’re deep into a project, and suddenly ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
372 views
+1 vote
2 answers

Can you use Power BI Fabric to create dynamic, personalized narratives based on user roles or preferences?

Power BI Fabric makes it possible to ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
529 views
0 votes
1 answer

Is there a way to ignore touch events on Text in React Native, or can they be managed differently?

Yes! In React Native, you can ignore ...READ MORE

Feb 22 in Node-js by Kavya
663 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
378 views
0 votes
2 answers

What are the best practices for structuring a narrative-driven report in Power BI using Fabric?

Use a guided layout with clear visual ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
839 views
0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
403 views
0 votes
0 answers

How would you approach the unexpected introduction of a competitor product?

I'm working on a project, and out ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
429 views
0 votes
0 answers
0 votes
1 answer

How do you design a data model for a social media platform using MongoDB?

Design a MongoDB data model for a ...READ MORE

Feb 23 in Node-js by Kavya
591 views
0 votes
0 answers

How do I adjust Keras callbacks to log training progress into a TensorBoard?

Can i know How do I adjust ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
502 views
0 votes
0 answers

How do you manage critical interdependencies in complex projects?

I’m working on a complex project where ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
402 views
0 votes
1 answer

What’s your approach when a project’s risk increases unexpectedly?

When there are sudden problems in a ...READ MORE

Feb 27 in PMP by Naira
425 views
0 votes
1 answer

How do you integrate authentication with React-Router?

To integrate authentication with React Router, follow ...READ MORE

Feb 24 in Node-js by Kavya
558 views
0 votes
1 answer

Which of the following method is used for cross-domain Ajax calls?

The correct method used for cross-domain Ajax ...READ MORE

Feb 26 in Angular by Kavya
450 views
0 votes
0 answers

jhegru ujshdfui ashdiushduiash iudhausdhyis diadh sa

snehbrjdjweh ikdiuw diukhsd iuasyd8s diasdhiasdy iasdiuasyd8iasdyuia sdyiuasydiuays ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by lkijhgf

edited Mar 5 257 views
0 votes
1 answer

Should I use map or switchmap when using angular http module?

When working with the Angular HTTP module, ...READ MORE

Feb 24 in Angular by Navya
524 views
0 votes
0 answers

How do you manage knowledge sharing in a diverse, cross-functional team?

When you’re working with people from different ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
351 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,217 views
0 votes
0 answers

How do you handle communication issues with an international team?

I’m working with an international team, and ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
393 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26 in Angular by Tanya
442 views
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
416 views
+1 vote
1 answer
0 votes
0 answers
0 votes
1 answer

How would you use NavLink to style active navigation links in a React application?

You can use the <NavLink> component to ...READ MORE

Feb 23 in Node-js by Kavya
572 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
488 views
0 votes
0 answers
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
339 views
0 votes
2 answers

How do I choose between Power BI Premium, Power BI Embedded, and Azure Analysis Services for different use cases?

Choose Power BI Premium for internal enterprise ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
811 views
0 votes
0 answers

How do I use Keras to train a Bidirectional LSTM model for sentence classification?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
464 views
0 votes
1 answer

What is the best proper way to create the meta data for your page?

Best Way to Set Metadata in a ...READ MORE

Feb 24 in Java-Script by Kavya
538 views
0 votes
1 answer

Is it possible to handle React events using the Chrome extension?

Yes, it's possible to handle React events ...READ MORE

Feb 22 in Node-js by Kavya
630 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
646 views
0 votes
1 answer

How do you implement routing in a React application?

Implementing Routing in a React Application (React ...READ MORE

Feb 23 in Node-js by Kavya
564 views
0 votes
1 answer

How do I fix a 401 unauthorized status code?

A 401 Unauthorized status code means the ...READ MORE

Feb 26 in Angular by Kavya
429 views
0 votes
0 answers

How do you keep the team focused if they lack interest in the project topic?

I've been in situations where the team ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
462 views
0 votes
0 answers

Why does enabling multi-factor authentication increase your security?

Multi-factor authentication (MFA) adds an extra layer ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
333 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
374 views
0 votes
0 answers

How do you assess project viability if objectives remain uncertain?

How do you decide if a project ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
372 views
0 votes
1 answer

How would you implement a chat application using MongoDB’s data model patterns?

To implement a chat application using MongoDB’s ...READ MORE

Feb 23 in Node-js by Kavya
559 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
722 views
0 votes
1 answer

How to secure a WordPress site from Brute Force Attacks?

Securing your WordPress site against brute force ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

reshown Mar 12 by Anupam 466 views
0 votes
0 answers

How can I implement word embedding using Keras for semantic text analysis?

With the help of proper code can ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
454 views
0 votes
1 answer

What is the default response type of HttpClient service?

By default, HttpClient assumes the server response ...READ MORE

Feb 25 in Node-js by Navya
464 views
0 votes
2 answers

How do I manage Power BI authentication using OAuth 2.0 in enterprise environments?

Use Azure AD to register an application, ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
887 views
0 votes
1 answer

How do you use Journaling for write concern in MongoDB?

Using Journaling for Write Concern in MongoDB Journaling ...READ MORE

Feb 23 in Node-js by Kavya
556 views
0 votes
0 answers

How do RBAC and ABAC models regulate access control?

Role-Based Access Control (RBAC) and Attribute-Based Access ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
323 views