Trending questions in Edureka Community

0 votes
0 answers

How do you approach client dissatisfaction after project deliverables?

What’s the best way to handle a ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
822 views
0 votes
1 answer
0 votes
0 answers

Describe a situation where you had to resolve a conflict between team members. What was your approach?

Can you share a time when you ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
598 views
0 votes
0 answers

How do Observables improve API call handling in Angular?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
721 views
0 votes
0 answers

What strategies do you use to identify and address quality issues proactively?

What’s your strategy for spotting and fixing ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
329 views
0 votes
0 answers

What is the best way to share services across Modules in angular2?

i want know with the help of ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
645 views
0 votes
0 answers

What techniques reveal NTP server configurations?

Attackers often probe NTP servers for misconfigurations ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
379 views
0 votes
0 answers

How do you handle cultural differences within an international project team?

How do you deal with cultural differences ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
592 views
0 votes
0 answers

How would you handle a situation where key project stakeholders have conflicting objectives?

What would you do if key stakeholders ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
656 views
0 votes
0 answers

How do you apply transform functions in PipeTransform Interface?

i want know with the help of ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
641 views
0 votes
0 answers

How do you handle a situation where a team member disagrees with your project decisions?

How do you go about assessing risks ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
582 views
0 votes
0 answers

How to pass data from one service to another service in Angular?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
711 views
0 votes
0 answers

What tools help identify SNMP community strings?

SNMP community strings act as passwords to ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
371 views
0 votes
0 answers

How do you ensure stakeholder engagement throughout the project?

What’s your strategy for keeping stakeholders engaged ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
409 views
0 votes
0 answers

How do you ensure continuous risk monitoring throughout the project lifecycle?

How do you keep track of risks ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
409 views
0 votes
0 answers

How can ethical hacking be used to protect IT systems and data?

Ethical hacking helps identify vulnerabilities before malicious ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
448 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
752 views
0 votes
0 answers

What strategies do you use to communicate risks to stakeholders?

How do you communicate risks to stakeholders ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
405 views
0 votes
0 answers

How would you integrate a new team member into an ongoing project?

How do you get a new team ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
404 views
0 votes
0 answers

How can I optimize hyperparameters in a lightGBM model for time-series forecasting?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
1,027 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,149 views
0 votes
0 answers

How does AI detect spam emails?

AI-driven spam detection analyzes email content, headers, ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
454 views
0 votes
0 answers

What are the tools for reconnaissance in Kali Linux?

Reconnaissance is the first phase of ethical ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
440 views
0 votes
0 answers

How do you handle inconsistent training results in a GPT-3 model for email content generation?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
742 views
0 votes
1 answer

How do you choose the root node while constructing a decision tree?

Selecting the root node in a decision ...READ MORE

Feb 25, 2025 in Node-js by Navya
970 views
0 votes
0 answers

How can we protect against packet sniffing?

Packet sniffing allows attackers to capture and ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
841 views
0 votes
0 answers

How can we combine multiple built-in pipes in Angular templates?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
709 views
0 votes
0 answers

How to audit Active Directory security using PowerShell?

Active Directory security audits help identify misconfigurations ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
437 views
0 votes
4 answers

Selenium Exception error -Element is not clickable at point (x, y). Other element would receive the click

If waitings for element, sleeps and oher ...READ MORE

Dec 13, 2019 in Selenium by Douglas
79,389 views
0 votes
0 answers

How to monitor Windows event logs using PowerShell?

Windows event logs provide crucial insights into ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
446 views
0 votes
0 answers

How to use Angular services to share data between components?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
693 views
0 votes
0 answers

How to do API security testing using Burp Suite?

Burp Suite is a powerful tool for ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
434 views
0 votes
0 answers

How to enforce PCI DSS compliance in web applications?

PCI DSS sets security standards for handling ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
606 views
0 votes
0 answers

How is enumeration used to gather information about a target?

Enumeration is a process used in cybersecurity ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
833 views
0 votes
0 answers

What are the techniques used in memory forensics?

Memory forensics helps investigate cyber threats by ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
429 views
0 votes
0 answers

How do you ensure projects align with evolving industry standards?

With industries always changing, how do you ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
627 views
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,260 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
697 views
0 votes
0 answers

How to improve threat intelligence?

Effective threat intelligence helps organizations detect and ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
422 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
774 views
0 votes
1 answer

How can I calculate the year-over-year percentage change using custom fiscal week numbers in Power BI Desktop?

In Power BI, to evaluate the YoY ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
813 views
0 votes
2 answers

What strategies can you use to handle the Power BI Gateway refresh limit?

Optimize Power BI Gateway refresh by using ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
1,913 views
0 votes
2 answers

How do I manage Power BI authentication using OAuth 2.0 in enterprise environments?

Use Azure AD to register an application, ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,374 views
0 votes
0 answers

How do you detect a rootkit in Linux?

Rootkits are stealthy malware that can hide ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
420 views
0 votes
0 answers

What type of operation do RxJS operators allow for observables?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
678 views
0 votes
0 answers

How to test a threat intel Filebeat module rule in ELK?

The Filebeat module in ELK is used ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
428 views
0 votes
0 answers

What’s the difference between pure and impure pipes?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
689 views
0 votes
0 answers

What countermeasures prevent NFS share exploitation?

Misconfigured NFS shares can lead to unauthorized ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
336 views
0 votes
0 answers

How to check open ports in Python?

Scanning open ports helps identify network vulnerabilities ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
426 views
0 votes
0 answers

How can the MITRE ATT&CK framework be used in incident response?

The MITRE ATT&CK framework provides structured threat ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
416 views