About crowdstrike
Company Description
CrowdStrike is a global leader in cybersecurity, providing advanced endpoint protection, threat intelligence, and cyberattack response services. Founded in 2011 and headquartered in Sunnyvale, California, CrowdStrike utilizes innovative cloud-based technology and artificial intelligence to safeguard organizations from cyber threats. The company’s mission centers on stopping breaches and protecting customer data through proactive and responsive security measures. CrowdStrike boasts a dynamic and inclusive work culture that fosters collaboration, creativity, and continuous learning. Employees are encouraged to innovate and think outside the box while maintaining a strong commitment to operational excellence and customer satisfaction. The work environment at CrowdStrike is fast-paced, with a strong emphasis on teamwork, integrity, and agility, allowing for rapid adaptation to the evolving cybersecurity landscape.
Software Engineer Interview Questions
Q1: What programming languages are you proficient in, and which do you prefer for software development?
I am proficient in several programming languages, including Python, Java, and C++. I prefer Python for its readability and extensive libraries, which facilitate rapid development and prototyping.
Q2: Can you describe a challenging technical problem you faced and how you resolved it?
In a previous project, I encountered performance issues with a data processing application. After analyzing the code, I identified bottlenecks in database queries. I optimized the queries and implemented caching, which improved performance significantly.
Q3: How do you ensure the quality of your code?
I follow best practices such as writing unit tests, conducting code reviews, and using static analysis tools. Continuous integration practices also help ensure that the code meets quality standards before deployment.
Q4: What experience do you have with cloud technologies?
I have experience working with AWS and Azure, where I have deployed applications and utilized services like EC2, Lambda, and Azure Functions to build scalable, resilient systems.
Q5: How do you stay updated with the latest trends and technologies in software development?
I regularly participate in online courses, attend webinars, and read industry blogs. I also engage in developer communities to exchange knowledge and learn from peers.
Cybersecurity Analyst Interview Questions
Q1: What is your understanding of the Cyber Kill Chain, and why is it important?
The Cyber Kill Chain is a model that outlines the stages of a cyber attack, from reconnaissance to actions on objectives. Understanding it helps analysts identify intrusion patterns and strengthen defenses against each stage of an attack.
Q2: Describe your experience with threat hunting. What tools have you used?
I have conducted threat hunting using tools like Splunk and ELK Stack. I analyze logs and network traffic to identify anomalies and potential threats, proactively addressing vulnerabilities before they are exploited.
Q3: How do you prioritize incidents when multiple alerts are triggered?
I assess incidents based on potential impact and severity. Critical incidents that pose a direct threat to business operations are prioritized, while lower-risk incidents are handled according to established SLAs.
Q4: What steps would you take if you detected a security breach?
I would first contain the breach to prevent further damage, then analyze the incident to understand the scope and root cause. Finally, I would document the findings and work on remediation while communicating with stakeholders.
Q5: How do you maintain compliance with data protection regulations?
I stay informed about relevant laws and regulations, such as GDPR and HIPAA. I also ensure that security policies and practices are aligned with compliance requirements through regular audits and assessments.
Incident Response Specialist Interview Questions
Q1: Can you explain the incident response lifecycle?
The incident response lifecycle consists of five phases: preparation, identification, containment, eradication, and recovery. Each phase is crucial for effectively managing and mitigating incidents.
Q2: Describe a time when you handled a high-pressure incident. What was your approach?
During a significant DDoS attack, I coordinated with the IT team to implement immediate mitigation strategies while keeping stakeholders informed. I prioritized communication and rapid response to minimize downtime.
Q3: What tools do you use for incident detection and response?
I utilize SIEM tools like Splunk for real-time monitoring and analysis, alongside endpoint detection solutions like CrowdStrike Falcon to identify and respond to threats swiftly.
Q4: How do you ensure effective communication during an incident?
I establish clear communication protocols, ensuring that all relevant parties are informed of the incident status and response actions. Regular updates help maintain transparency and coordination.
Q5: What lessons have you learned from past incidents?
I’ve learned the importance of thorough documentation and post-incident reviews. They provide insights into improving our incident response strategy and help prevent similar incidents in the future.
Sales Engineer Interview Questions
Q1: How do you approach understanding a potential client's needs?
I conduct thorough research and engage in discussions to uncover specific pain points and requirements. Understanding their business context allows me to tailor our solutions effectively.
Q2: Describe a successful sales strategy you implemented in your previous role.
I developed a consultative selling approach, focusing on building relationships and trust with clients. This led to increased customer retention and higher conversion rates as clients felt more valued.
Q3: How do you handle technical objections from potential customers?
I listen carefully to their concerns and address them directly, providing clear explanations and demonstrating how our solutions can overcome those challenges. I also use case studies to illustrate success stories.
Q4: What experience do you have with cybersecurity products?
I have worked extensively with various cybersecurity solutions, including endpoint protection, threat intelligence, and SIEM platforms. My technical background allows me to explain complex concepts to clients effectively.
Q5: How do you stay informed about competitors and market trends?
I regularly read industry publications, attend trade shows, and participate in webinars. Networking with other professionals also provides insights into emerging trends and competitor strategies.
Conclusion Interview Questions
By focusing on the various roles within CrowdStrike, candidates can prepare effectively for interviews by understanding the skills required and practicing pertinent questions. This approach helps demonstrate their knowledge and fit for the dynamic cybersecurity environment at CrowdStrike.
Company Background and Industry Position
crowdstrike has cemented itself as a powerhouse in the cybersecurity realm, and not just because it’s one of the fastest-growing unicorns in tech. Founded in 2011, the company revolutionized endpoint protection by embracing cloud-native architecture and AI-driven threat intelligence. Unlike traditional security firms that rely heavily on signature-based detection, CrowdStrike’s Falcon platform leverages behavioral analytics and real-time data to spot sophisticated cyber threats before they wreak havoc.
Within a market saturated by giants like Symantec and McAfee, CrowdStrike’s innovative approach and rapid adaptability give it an edge. That edge, though, permeates beyond just the product—it’s deeply ingrained in their hiring philosophy and recruitment strategy. They’re not merely looking for coders or security analysts; they seek individuals who understand the rapidly evolving threat landscape and who can think like both attacker and defender.
How the Hiring Process Works
- Initial Application Review and Screening: Once you hit submit on your resume, expect an initial recruiter screen. This is a brief chat focused on your background alignment, interest in cybersecurity, and communication skills. Recruiters here act as gatekeepers, not just filtering for skills but ensuring cultural fit early on.
- Technical Assessment: Depending on the role, this could be an online coding test, a case study, or a practical problem-solving task relevant to cybersecurity. This step weeds out candidates who might have the credentials but lack the hands-on abilities to thrive.
- Phone or Video Interviews: Generally, you’ll have a round with a hiring manager or senior engineer. Here, expect a mix of technical deep-dives and behavioral questions. They want to gauge how you approach problems, handle ambiguity, and fit within their collaborative teams.
- Onsite or Extended Virtual Interviews: The multi-hour session (or spread over days, especially since remote has become normalized) includes panel interviews with stakeholders across departments. This stage dives into role-specific competencies, problem scenarios, and often cultural fit discussions.
- HR Interview and Offer Discussion: The final checkpoint deals with your salary expectations, benefits, and any clarifications. It’s also a chance for you to ask about career paths and company culture directly.
Interview Stages Explained
Recruiter Screening – More than Just a Form
This stage is often underrated. Recruiters at CrowdStrike don’t just scan resumes—they listen closely for passion for cybersecurity and a genuine curiosity about the threat landscape. It’s an instinctual filter. Expect questions about why you want to work in this space; vague answers rarely cut it. The goal? To ensure you aren't just qualified on paper but are motivated to thrive in a high-pressure, fast-changing environment.
Technical Assessment – The Skill Litmus Test
Why does CrowdStrike insist on these assessments? It’s simple—they want to see real problem-solving under simulated pressure. For software engineers, it’s about coding efficiency, algorithmic thinking, and sometimes debugging legacy code. For security analysts, you might be asked to analyze logs, detect anomalies, or map out attack vectors. This step gives hiring teams concrete evidence of your hands-on capabilities, beyond what a resume can convey.
Phone/Video Interviews – The Real Talk
The technical interview often feels like a conversation but make no mistake—it’s intense. Interviewers probe your understanding of cybersecurity concepts, coding languages, or system architectures. They challenge your assumptions to see how flexible your thinking is. This stage also tests your communication; cybersecurity professionals often need to explain complex threats to non-technical stakeholders, and this skill is frequently assessed here.
Onsite or Extended Virtual Interviews – The Deep Dive
Usually the most grueling phase. Think of it as a day-long audit of your abilities and mindset. You’ll face whiteboard sessions, scenario-based questions, and possibly pair programming. Panels might include engineers, product managers, and security specialists. Each seeks to validate whether you can collaborate effectively and innovate under pressure. CrowdStrike invests heavily here because the stakes are high—security breaches can be devastating, and every team member's competence matters.
HR Interview – Wrapping Up and Setting Expectations
This stage is often overlooked by candidates but is crucial. Beyond checking salary range expectations and eligibility criteria, the HR representative gauges your long-term fit and motivation. They’ll discuss company values, work flexibility, and benefits. It’s also your chance to understand their support for professional growth or work-life balance, factors that impact your decision profoundly.
Examples of Questions Candidates Report
- Technical Interview: "Walk me through a recent cyber attack you analyzed. How did you identify the threat vector?"
- Coding Challenge: "Write a function to detect anomalies in a stream of network packets with time constraints."
- Behavioral Interview: "Describe a time you had to convince a skeptical stakeholder about a security risk."
- Scenario-Based: "How would you respond if you detected unauthorized lateral movement within the network?"
- HR Interview: "What motivates you about working at CrowdStrike, and how do you handle high-stress situations?"
Eligibility Expectations
Entry-level candidates generally need a solid foundation in computer science or cybersecurity with relevant internships or projects. CrowdStrike values hands-on experience, so certifications such as CISSP, CEH, or OSCP can give you an edge. Mid to senior-level roles require demonstrable expertise in specific areas like threat intelligence, malware analysis, or cloud security architectures.
Academic pedigree is less rigid compared to many tech firms, but clear evidence of problem-solving skills and proactive learning is non-negotiable. The company also places emphasis on diversity and inclusion, so they welcome varied backgrounds that contribute to innovative thinking.
Common Job Roles and Departments
The most common positions span these key functions:
- Security Engineers: Designing and maintaining secure infrastructures.
- Threat Intelligence Analysts: Researching and anticipating adversaries’ tactics.
- Software Developers: Building and optimizing Falcon platform components.
- Customer Success Engineers: Bridging tech solutions with client needs.
- Product Managers: Steering feature development aligned with market trends.
Each role demands nuanced skills. For example, developers often need proficiency in Python, Go, or C++, while threat analysts rely heavily on knowledge of malware behavior and incident response frameworks.
Compensation and Salary Perspective
| Role | Estimated Salary (USD) |
|---|---|
| Entry-Level Security Analyst | $75,000 - $95,000 |
| Software Engineer (Mid-Level) | $110,000 - $140,000 |
| Senior Threat Intelligence Analyst | $130,000 - $165,000 |
| Product Manager | $120,000 - $160,000 |
| Customer Success Engineer | $95,000 - $125,000 |
Salary ranges vary based on location, experience, and specific skills. Compared to industry peers like Palo Alto Networks or FireEye, CrowdStrike offers competitive compensation combined with equity packages, reflecting their startup roots and growth aspirations.
Interview Difficulty Analysis
Many candidates describe CrowdStrike’s hiring process as challenging but fair. The technical rounds particularly test depth and adaptability rather than rote memorization. You'll often get a sense that interviewers expect you to think aloud, showing your reasoning rather than just the right answer. That transparency in your thought process is vital.
The behavioral and cultural fit discussions can be unexpectedly probing, aimed at assessing resilience and alignment with rapid innovation cycles. The process is rigorous, partly because the cost of hiring the wrong person in cybersecurity is exceptionally high. So while the difficulty level is above average, it’s designed to mirror the job’s real-world demands.
Preparation Strategy That Works
- Deep Dive into Falcon Platform: Understand CrowdStrike’s core offerings and industry impact. This helps in tailoring your answers and demonstrates genuine interest.
- Practice Coding and Security Challenges: Use platforms like LeetCode, HackerRank for coding; and try hands-on labs on platforms like TryHackMe or Hack The Box to sharpen security skills.
- Simulate Behavioral Interviews: Prepare to articulate real scenarios where you demonstrated problem-solving, teamwork, and adaptability.
- Stay Updated on Cybersecurity Trends: CrowdStrike values candidates who keep pace with emerging threats and technologies.
- Mock Interviews with Industry Peers: Receiving honest feedback can unveil blind spots in your approach or communication.
Work Environment and Culture Insights
CrowdStrike’s culture revolves around agility, innovation, and high accountability. Employees often mention a “mission-driven” atmosphere—knowing they’re defending against real-world threats adds meaning to everyday tasks. However, this also means the environment can be fast-paced and occasionally intense. Collaboration is prized, and cross-team communication is frequent, reflecting the interdisciplinary nature of cybersecurity work.
Remote work has become more normalized, but teams still emphasize regular syncs and knowledge sharing. Expect a blend of structured processes and room for autonomous decision-making.
Career Growth and Learning Opportunities
The company invests significantly in employee development. Continuous learning is almost a given—be it through internal training, attending cybersecurity conferences, or obtaining advanced certifications. CrowdStrike’s rapid growth fuels abundant opportunities for upward mobility, lateral moves, and leadership roles. The firm’s openness to innovation means employees are often encouraged to experiment with emerging technologies or contribute to open-source projects.
Real Candidate Experience Patterns
Many candidates recount the interview as a mix of excitement and pressure. The technical rounds require stamina, and some mention feeling like they had to “prove their thinking” more than just their knowledge. A common theme is that transparency and honesty during problem-solving earn respect even if you don’t nail every question perfectly.
Some candidates highlight communication as a subtle but critical factor. Interviewers listen for clarity and how well you can simplify complex concepts, reflecting the job’s real demands. Another frequent observation is the friendly yet professional vibe of interviewers, which helps ease nerves despite the process’s intensity.
Comparison With Other Employers
| Aspect | crowdstrike | Palo Alto Networks | FireEye |
|---|---|---|---|
| Hiring Process Complexity | Moderate to High | High | High |
| Technical Focus | Strong on behavioral analytics & cloud security | Network security-centric | Specialized in threat intelligence |
| Salary Competitiveness | Above average + equity | Competitive with bonuses | Competitive but less equity |
| Work Culture | Fast-paced & mission-driven | More structured, large corp feel | Niche, research-heavy |
| Candidate Experience | Transparent & engaging | Highly challenging | Technical depth focused |
In brief, CrowdStrike balances technical rigor with a startup-like agility, making it attractive for candidates who want both challenge and innovation opportunities.
Expert Advice for Applicants
- Don’t just memorize answers—focus on understanding the “why” behind cybersecurity problems.
- Practice explaining complex technical concepts in plain language; communication matters as much as technical skill.
- Prepare real examples from your experience that highlight your problem-solving and teamwork.
- Research recent CrowdStrike news and developments to show you’re not just applying blindly.
- Be yourself, but also be ready to demonstrate resilience under pressure. The interview is as much about mindset as it is about skill.
Frequently Asked Questions
What types of interview questions does CrowdStrike usually ask?
Expect a balanced mix of technical, scenario-based, and behavioral questions tailored to the role. Technical interviews often focus on coding, cybersecurity principles, or problem-solving, while behavioral interviews explore your teamwork and communication skills.
How many recruitment rounds are typical at CrowdStrike?
The process usually includes 3 to 5 stages: recruiter screening, technical assessment, one or more technical interviews, an onsite or extended virtual session, and a final HR round.
What is the average salary range for security roles at CrowdStrike?
Entry-level roles typically start around $75,000, while senior positions can go up to $165,000 or more, depending on expertise and location. Equity and bonuses may be part of the package.
Are there specific eligibility criteria I must meet?
Generally, a relevant degree and hands-on experience or certifications in cybersecurity are important. CrowdStrike also values demonstrated problem-solving skills and passion over formal credentials alone.
How should I prepare for the technical interview?
Focus on practical coding exercises, cybersecurity case studies, and strengthening your conceptual understanding. Use mock interviews to practice articulating your thought process clearly.
Final Perspective
Applying to CrowdStrike is not just about landing a job; it’s about joining a frontline defense against the ever-evolving cyber threats that shape our digital lives. Their hiring process reflects this gravity—rigorous, demanding, but fair. It tests your technical prowess and your ability to think on your feet in a dynamic environment.
If you approach the recruitment rounds with thorough preparation, genuine curiosity, and a clear sense of your own strengths and growth areas, you’ll find the experience rewarding—even if you don’t immediately get an offer. The company’s culture demands adaptability and passion, so showing those qualities can make all the difference.
Remember, cybersecurity is a field where learning never stops. CrowdStrike isn’t just looking for employees; they want future leaders ready to innovate at the cutting edge of security technology. Prepare well, stay authentic, and you’ll have a solid shot at joining one of the most exciting companies in tech today.
crowdstrike Interview Questions and Answers
Updated 21 Feb 2026Sales Engineer Interview Experience
Candidate: Emma S.
Experience Level: Mid-level
Applied Via: Job Fair
Difficulty:
Final Result: Rejected
Interview Process
2
Questions Asked
- How do you explain complex cybersecurity solutions to non-technical clients?
- Describe a successful sales pitch you delivered.
- What challenges have you faced in technical sales?
Advice
Focus on communication skills and understanding client needs in cybersecurity context.
Full Experience
The interviews were conversational, focusing on my sales experience and ability to bridge technical and business aspects. Although I had relevant skills, they chose a candidate with deeper cybersecurity technical knowledge.
Threat Intelligence Analyst Interview Experience
Candidate: David L.
Experience Level: Mid-level
Applied Via: Recruiter Contact
Difficulty: Hard
Final Result:
Interview Process
4
Questions Asked
- Explain the kill chain model in cyber attacks.
- How do you analyze malware samples?
- Describe a time you provided actionable intelligence to prevent an attack.
- What tools do you use for threat hunting?
Advice
Have hands-on experience with threat analysis tools and be ready to discuss detailed case studies.
Full Experience
The process included a technical phone screen, a practical assessment involving malware analysis, and multiple interviews with the threat intelligence team focusing on real-world scenarios.
Product Manager Interview Experience
Candidate: Clara J.
Experience Level: Senior
Applied Via: Referral
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- How do you prioritize features in a cybersecurity product?
- Describe a challenging stakeholder management experience.
- What metrics do you track for product success?
Advice
Demonstrate strong product sense and understanding of cybersecurity market trends.
Full Experience
The interviews were a mix of behavioral and case study discussions. Emphasis was placed on my ability to align product strategy with customer needs and security challenges.
Software Engineer Interview Experience
Candidate: Brian K.
Experience Level: Entry-level
Applied Via: Company Website
Difficulty: Hard
Final Result: Rejected
Interview Process
4
Questions Asked
- Implement a function to detect a cycle in a linked list.
- Explain RESTful API design principles.
- Describe your experience with cloud platforms.
- How would you optimize a slow-running query?
Advice
Practice coding problems extensively and review system design basics.
Full Experience
The interview process was rigorous, starting with a coding test, followed by multiple technical interviews focusing on algorithms, system design, and behavioral questions. Despite good preparation, the competition was tough.
Security Analyst Interview Experience
Candidate: Alice M.
Experience Level: Mid-level
Applied Via: LinkedIn
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- Explain the difference between symmetric and asymmetric encryption.
- Describe a time you identified a security vulnerability.
- How do you stay updated with the latest cybersecurity threats?
Advice
Brush up on cybersecurity fundamentals and be ready to discuss real-world scenarios.
Full Experience
The process started with an online assessment followed by a technical phone interview focusing on security concepts. The final round was an onsite panel where I discussed past projects and solved case studies related to threat detection.
Frequently Asked Questions in crowdstrike
Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.
Common Interview Questions in crowdstrike
Q: A man has a wolf, a goat, and a cabbage. He must cross a river with the two animals and the cabbage. There is a small rowing-boat, in which he can take only one thing with him at a time. If, however, the wolf and the goat are left alone, the wolf will eat the goat. If the goat and the cabbage are left alone, the goat will eat the cabbage. How can the man get across the river with the two animals and the cabbage?
Q: A hare and a tortoise have a race along a circle of 100 yards diameter. The tortoise goes in one directionand the hare in the other. The hare starts after the tortoise has covered 1/5 of its distance and that too leisurely.The hare and tortoise meet when the hare has covered only 1/8 of the distance. By what factor should the hareincrease its speed so as to tie the race?
Q: A rich merchant had collected many gold coins. He did not want anybody to know about them. One day his wife asked, "How many gold coins do we have?" After pausing a moment, he replied, "Well! If I divide the coins into two unequal numbers, then 32 times the difference between the two numbers equals the difference between the squares of the two numbers."The wife looked puzzled. Can you help the merchant's wife by finding out how many gold coins they have?
Q: 9 cards are there. You have to arrange them in a 3*3 matrix. Cards are of 4 colors. They are red, yellow, blue and green. Conditions for arrangement: one red card must be in first row or second row. 2 green cards should be in 3rd column. Yellow cards must be in the 3 corners only. Two blue cards must be in the 2nd row. At least one green card in each row.
Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?
Q: There are two balls touching each other circumferencically. The radius of the big ball is 4 times the diameter of the small all. The outer small ball rotates in anticlockwise direction circumferencically over the bigger one at the rate of 16 rev/sec. The bigger wheel also rotates anticlockwise at N rev/sec. What is 'N' for the horizontal line from the centre of small wheel always is horizontal.
Q: T, U, V are 3 friends digging groups in fields. If T & U can complete i groove in 4 days &, U & V can complete 1 groove in 3 days & V & T can complete in 2 days. Find how many days each takes to complete 1 groove individually.
Q: The citizens of planet nigiet are 8 fingered and have thus developed their decimal system in base 8. A certain street in nigiet contains 1000 (in base 8) buildings numbered 1 to 1000. How many 3s are used in numbering these buildings?
Q: There are 3 sticks placed at right angles to each other and a sphere is placed between the sticks . Now another sphere is placed in the gap between the sticks and Larger sphere . Find the radius of smaller sphere in terms of radius of larger sphere.
Q: ABCDE are sisters. Each of them gives 4 gifts and each receives 4 gifts No two sisters give the same combination ( e.g. if A gives 4 gifts to B then no other sisters can give four to other one.)Â (i) B gives four to A.(ii) C gives 3 to E. How much did A,B,C,E give to D?
Q: Every day a cyclist meets a train at a particular crossing .The road is straight before the crossing and both are travelling in the same direction.Cyclist travels with a speed of 10 kmph.One day the cyclist come late by 25 minutes and meets the train 5 km before the crossing.What is the speed of the train?
Q: A vessel is full of liquid. From the vessel, 1/3rd of the liquid evaporates on the first day. On the second day 3/4th of the remaining liquid evaporates. What fraction of the volume is present at the end of the second day
Q: In a Park, N persons stand on the circumference of a circle at distinct points. Each possible pair of persons, not standing next to each other, sings a two-minute song ? one pair immediately after the other. If the total time taken for singing is 28 minutes, what is N?
Q: If I walk with 30 miles/hr i reach 1 hour before and if i walk with 20 miles/hr i reach 1 hour late. Find the distance between 2 points and the exact time of reaching destination is 11 am then find the speed with which it walks.
Q: There are four dogs/ants/people at four corners of a square of unit distance. At the same instant all of them start running with unit speed towards the person on their clockwise direction and will always run towards that target. How long does it take for them to meet and where?
Q: In a country where everyone wants a boy, each family continues having babies till they have a boy. After some time, what is the proportion of boys to girls in the country? (Assuming probability of having a boy or a girl is the same)
Q: A family X went for a vacation. Unfortunately it rained for 13 days when they were there. But whenever it rained in the mornings, they had clear afternoons and vice versa. In all they enjoyed 11 mornings and 12 afternoons. How many days did they stay there totally?
Q: A person meets a train at a railway station coming daily at a particular time. One day he is late by 25 minutes, and he meets the train 5 k.m. before the station. If his speed is 12 kmph, what is the speed of the train.
Q: There are some chickens in a poultry. They are fed with corn. One sack of corn will come for 9 days. The farmer decides to sell some chickens and wanted to hold 12 chicken with him. He cuts the feed by 10% and sack of corn comes for 30...
Q: Four persons have to cross the bridge they are having one torch light. Four persons take 1,2,5,10 minutes respectively, when two persons are going they will take the time of the slowest person. What is the time taken to cross by all of them.