Trending questions in Edureka Community

0 votes
0 answers

How do you manage stakeholder expectations when project delays are unavoidable?

How do you set realistic stakeholder expectations ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
261 views
0 votes
0 answers

What steps would you take if a key stakeholder is unresponsive?

How would you deal with a key ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
348 views
0 votes
1 answer

Cannot find name webgl object TypeScript issue TS2304.

The error Cannot find name 'WebGLObject'. TS2304 ...READ MORE

Mar 6 in Angular by Anvi
531 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7 in Power BI by anonymous
• 36,180 points
475 views
0 votes
0 answers

What are the impacts of incorrect VPN configurations?

Misconfigured VPNs can lead to security vulnerabilities, ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
300 views
0 votes
0 answers

Describe a time when you had to negotiate project terms with a difficult stakeholder.

Can you share a time when you ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
259 views
0 votes
0 answers

Describe your approach to managing stakeholders with conflicting interests.

How do you handle situations where different ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
337 views
0 votes
0 answers

Describe your approach to tracking project expenses.

How do you keep track of project ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
249 views
+1 vote
2 answers

How can I keep DAX Studio connection credentials consistent between Power BI and Excel?

Strategies for preserving uniform connection credentials in ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
621 views
0 votes
0 answers

Which of the following tools are used for network scanning?

There are multiple tools available for scanning ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
819 views
0 votes
1 answer

How to install Jest and React Testing Library in TypeScript?

To install and configure Jest and React ...READ MORE

Mar 6 in Java-Script by Anvi
513 views
0 votes
0 answers

Which option can be used to authenticate the IPsec peers during IKE Phase 1?

IKE Phase 1 establishes a secure connection ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
285 views
0 votes
0 answers

How do you handle a situation where quality requirements conflict with project constraints?

How do you handle situations where strict ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
237 views
+1 vote
2 answers

What processes occur internally in Power BI when a relationship is created between two tables?

When a relationship is created between two ...READ MORE

Jan 23 in Power BI by pooja
• 24,450 points
446 views
0 votes
0 answers

How do you ensure that all team members adhere to quality processes?

How do you make sure every team ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
236 views
0 votes
0 answers

What steps do you take to ensure continuous improvement in project processes?

What steps do you take to continuously ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
237 views
0 votes
0 answers

How would you handle a situation where the project deliverables do not meet quality standards?

What would you do if the final ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
237 views
+1 vote
2 answers

Is it possible to create report-level measures in Power BI while using a live query connection to an OLAP cube?

One of the restrictions is that, when ...READ MORE

Jan 13 in Power BI by pooja
• 24,450 points
586 views
+1 vote
6 answers

What best practices do you follow for data validation and audit trails in Power BI solutions?

Audit trails and data validation play a ...READ MORE

Nov 28, 2024 in Power BI by pooja
• 24,450 points
883 views
0 votes
0 answers

Describe a time when you had to manage a project with stringent quality standards.

Can you share an experience where you ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
229 views
0 votes
0 answers

How to find the IP address of the DNS server in Wireshark?

Wireshark is a powerful network analysis tool. ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
358 views
0 votes
0 answers

How to implement GDPR-compliant data anonymization in Python?

Data anonymization is essential for GDPR compliance ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
360 views
0 votes
0 answers

What is the impact of NetBIOS null session in hacking?

NetBIOS null sessions allow unauthorized access to ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
354 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,143 views
+1 vote
1 answer

What is the best approach to convert a Date/Time column to a Date data type in Power Query while using DirectQuery from SQL?

For DirectQuery, the best way to convert ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
703 views
0 votes
0 answers

What types of attacks and abuse does DNSSEC protect against?

DNSSEC adds cryptographic security to DNS to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
266 views
0 votes
1 answer

How to Calculate Total Sales for the Last 3 Months Dynamically in DAX?

To dynamically calculate total sales for the ...READ MORE

Mar 3 in Power BI by anonymous
• 36,180 points
608 views
+1 vote
2 answers

How can I extract embedded Excel data from PowerPoint slides for analysis?

Make Extraction of Embedded Excel Data from ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
596 views
0 votes
0 answers

How do you balance risk mitigation with project constraints like time and budget?

How do you find the right balance ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
307 views
0 votes
0 answers

How to prevent SQL injection attacks in Python?

SQL injection is a critical security threat ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
569 views
+1 vote
2 answers

Is it possible to extract Power BI metadata (e.g., dataset lineage) using Azure Data Factory?

Yes, you can extract typical metadata from ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
699 views
0 votes
0 answers

What strategies do you use to build trust with stakeholders?

What are your go-to strategies for building ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
217 views
0 votes
0 answers

SQL query for distinct professors and courses

There is a database on instructors, departments, ...READ MORE

Aug 26, 2022 in Database by Kithuzzz
• 38,000 points
25,503 views
0 votes
0 answers

How does LDAP anonymous binding expose user data?

LDAP anonymous binding allows unrestricted access to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
255 views
0 votes
0 answers

How does DNS Cache Snooping reveal internal domains?

DNS Cache Snooping allows attackers to check ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
250 views
0 votes
0 answers

What are the risks of LDAP injection in AD environments?

LDAP injection can allow attackers to manipulate ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
249 views
0 votes
1 answer

Is Page Refresh Necessary for Route Re-Load in ReactJS?

No, a page refresh is not necessary ...READ MORE

Mar 6 in Java-Script by Anvi
472 views
0 votes
0 answers

What strategies do you use to identify and address quality issues proactively?

What’s your strategy for spotting and fixing ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
196 views
0 votes
0 answers

When to use switchMap vs concatMap?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
586 views
0 votes
0 answers

What was/is the purpose of the MONLIST command in NTP?

The MONLIST command in older NTP versions provided ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
246 views
0 votes
0 answers

How do attackers enumerate NFS exports on a network?

NFS (Network File System) can expose shared ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
243 views
0 votes
1 answer

Calculating Average Customer Purchase Frequency with Unique Customerspo

To accurately calculate the Average Customer Purchase ...READ MORE

Mar 5 in Power BI by anonymous
• 36,180 points
508 views
0 votes
0 answers

Which Nmap flag is used for performing a default script scanning?

Nmap provides various flags for scanning networks ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
507 views
0 votes
1 answer

How do I deploy a Keras model in production and monitor its performance over time?

Deploy a Keras model using a Flask ...READ MORE

Mar 19 in Generative AI by nini
387 views
0 votes
0 answers

Describe a situation where you had to take a calculated risk. What was the outcome?

Can you share a time when you ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
272 views
+1 vote
2 answers

How can I filter a dataset in Power BI to show records where a date column is less than the slicer value?

Filtering a dataset in Power BI to ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
670 views
0 votes
0 answers

What techniques reveal NTP server configurations?

Attackers often probe NTP servers for misconfigurations ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
229 views