Trending questions in Edureka Community

0 votes
1 answer

Can DNS zone transfers be used for attacks other than enumeration?

DNS zone transfers (AXFR) are legitimate mechanisms ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
421 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
406 views
0 votes
1 answer

What’s the difference between burndown and burnup charts in Scrum dashboards?

Burndown and burnup charts are crucial Scrum ...READ MORE

Apr 15 in PMP by Naira
414 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
566 views
0 votes
1 answer

How does IP fragmentation work?

​IP fragmentation is a mechanism used in ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
445 views
0 votes
1 answer

What’s the impact of Theory of Constraints (TOC) in project bottleneck management?

Eliyahu Goldratt invented the Theory of Constraints ...READ MORE

Apr 14 in PMP by Naira
440 views
0 votes
1 answer

How can I create a custom visual that allows user input?

Actually, a native way of allowing user ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
690 views
0 votes
1 answer

Design a workflow to generate context-aware embeddings for legal document indexing in LLamaIndex.

You can generate context-aware embeddings for legal ...READ MORE

Apr 21 in Generative AI by mimi
393 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
565 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10 in Node-js by anonymous
626 views
0 votes
1 answer

How do zero-day vulnerabilities impact security?

​Zero-day vulnerabilities are security flaws in software ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
607 views
0 votes
1 answer

How do I apply row-level security in Power BI while keeping performance optimal?

To implement Row-Level Security (RLS) in Power ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
983 views
0 votes
1 answer

How does machine learning detect anomalies in port scans?

​Machine learning (ML) models are increasingly employed ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
433 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10 in Angular by anonymous
597 views
0 votes
0 answers

What is the CVSS base score, and how is it calculated?

The CVSS base score measures the severity ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
427 views
0 votes
1 answer

How does AI detect invasive scanning techniques?

AI enhances network security by detecting invasive ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
401 views
0 votes
1 answer

What role does SPI (Schedule Performance Index) play in forecasting delays?

SPI (timetable Performance Index) is a project ...READ MORE

Apr 15 in PMP by Naira
379 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
394 views
0 votes
1 answer

Who are the three main participants in the man in the middle attack?

​In a Man-in-the-Middle (MitM) attack, three primary ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
377 views
0 votes
0 answers
0 votes
1 answer

What’s the best way to visualize cumulative flow diagrams (CFD) in ClickUp Dashboards?

ClickUp enables showing Agile data, although Cumulative ...READ MORE

Apr 8 in PMP by Naira
692 views
0 votes
1 answer

Can I integrate Confluence meeting notes with my JIRA sprints?

Yes, you can link Confluence meeting notes ...READ MORE

Apr 15 in PMP by Naira
365 views
0 votes
1 answer

How does AI predict the best scanning method for networks?

Artificial Intelligence (AI) enhances network scanning by ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
413 views
0 votes
1 answer

How do you calculate project float manually vs. using a tool?

Project float (or slack) refers to the ...READ MORE

Apr 15 in PMP by Naira
368 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
354 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
573 views
0 votes
1 answer

What are common false positives in vulnerability scanning?

Vulnerability scanners are essential for identifying potential ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
409 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10 in Node-js by anonymous
594 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
357 views
0 votes
1 answer

How can attackers exploit IPsec security associations?

​IPsec Security Associations (SAs) are fundamental to ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
359 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
374 views
0 votes
1 answer

What are real-time monitoring tools for vulnerability detection?

Real-time vulnerability detection tools are essential for ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
402 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
572 views
0 votes
1 answer

How do I set up a Power BI Embedded solution with row-level security for external users?

To enable Power BI Embedded for external ...READ MORE

Mar 25 in Power BI by anonymous
• 36,180 points
1,255 views
0 votes
1 answer

How does AI predict attack vectors in enumeration?

​AI enhances cybersecurity by predicting potential attack ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
401 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
528 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
385 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
352 views
0 votes
1 answer

What’s the best method for implementing a Change Control Board (CCB) process?

A CCB is a formal organization that ...READ MORE

Apr 14 in PMP by Naira
391 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
522 views
0 votes
1 answer

How to highlight specific dates with custom styles in jQuery UI Datepicker?

Here's how to highlight specific dates with ...READ MORE

Apr 7 in Node-js by anonymous
684 views
0 votes
1 answer

How do you perform S-Curve analysis for project financial performance?

The S-curve analysis measures cumulative cost, effort, ...READ MORE

Apr 14 in PMP by Naira
385 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
320 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
318 views
0 votes
1 answer

What’s the best way to automate issue triaging in Jira Service Management?

Efficient issue triaging in Jira Service Management ...READ MORE

Apr 8 in PMP by Naira
628 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
373 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
314 views
0 votes
1 answer

How to dynamically inject components into the DOM using @Component?

You need to use ComponentFactoryResolver and ViewContainerRef. ...READ MORE

Apr 10 in Node-js by anonymous
563 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15 in PMP by Naira
321 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
389 views