securonix Recruitment Process, Interview Questions & Answers

Securonix employs a rigorous selection involving a technical assessment on cybersecurity concepts, coding tests, and multiple interviews to gauge analytical thinking and alignment with security protocols.
4.3
based on 50 Reviews
About Company
Interview Guide
Interviews Experiance
FAQ's Questions

About securonix

Company Description

Securonix is a leading provider of next-generation security information and event management (SIEM) solutions. Founded in 2013, the company leverages machine learning and advanced analytics to deliver comprehensive threat detection, investigation, and response capabilities. Securonix's innovative platform allows organizations to identify and mitigate threats in real-time, ensuring the protection of critical assets and sensitive data. The work culture at Securonix is characterized by a commitment to excellence, collaboration, and continuous learning. Employees are encouraged to think creatively and take initiative, fostering a dynamic environment where innovation thrives. The job environment is inclusive and supportive, with a strong emphasis on professional development and work-life balance.

Job Roles Interview Questions

Based on Securonix's focus on cybersecurity and SIEM, here are some relevant job roles:

1. Security Analyst

2. Data Scientist

3. DevOps Engineer

4. Software Engineer

5. Product Manager

Security Analyst Interview Questions

Q1: What tools do you use for monitoring and analyzing security incidents?

I utilize various SIEM tools like Splunk and Securonix itself, as well as endpoint detection and response solutions like CrowdStrike. Additionally, I leverage threat intelligence platforms to stay updated on current threats.

Q2: Can you explain how you would respond to a security breach?

In the event of a security breach, I would first contain the breach to prevent further damage. Then, I would conduct a thorough investigation to determine the cause and impact, followed by documenting the findings and implementing measures to prevent future incidents.

Q3: How do you keep yourself updated with the latest cybersecurity threats?

I subscribe to cybersecurity newsletters, participate in online forums, attend webinars, and engage in continuous education programs to stay informed about the latest threats and trends in the industry.

Q4: Describe a time when you successfully identified a potential security threat.

In my previous role, I analyzed network traffic and identified unusual patterns that indicated a potential data exfiltration attempt. I escalated the issue to my manager, and we were able to mitigate the threat before any data was compromised.

Q5: What is your approach to risk assessment?

I use a structured approach that includes identifying assets, assessing vulnerabilities, determining the potential impact of threats, and prioritizing risks based on their likelihood and potential impact to the organization.

Data Scientist Interview Questions

Q1: What machine learning algorithms are you familiar with in the context of cybersecurity?

I am familiar with algorithms such as decision trees, random forests, support vector machines, and neural networks, particularly in anomaly detection and predictive modeling for threat intelligence.

Q2: How do you handle imbalanced datasets in your analysis?

I apply techniques such as oversampling the minority class, undersampling the majority class, or utilizing algorithms that are robust to imbalance. Additionally, I may use synthetic data generation methods like SMOTE.

Q3: Can you explain a project where you analyzed security data?

I worked on a project analyzing user behavior data to identify anomalous login patterns that could indicate compromised accounts. I built a predictive model that reduced false positives in our alerting system.

Q4: How do you ensure the quality of your data?

I conduct data cleansing processes, validate data sources, and implement checks to identify and correct errors or inconsistencies in the data before analysis.

Q5: What tools do you use for data visualization?

I commonly use tools like Tableau and Power BI for data visualization, as well as Python libraries such as Matplotlib and Seaborn to create visual representations of complex data sets.

DevOps Engineer Interview Questions

Q1: What is your experience with CI/CD pipelines?

I have experience designing and implementing CI/CD pipelines using tools like Jenkins and GitLab CI, which automate the testing and deployment of applications, ensuring faster and more reliable releases.

Q2: How do you manage infrastructure as code?

I use tools like Terraform and Ansible to define and manage infrastructure through code, enabling version control and automated provisioning of environments.

Q3: Can you describe a time you resolved a production incident?

Once, a critical service went down due to a misconfiguration in the load balancer. I quickly diagnosed the issue, rolled back the configuration, and implemented additional monitoring to prevent future occurrences.

Q4: What monitoring tools do you use?

I use tools like Prometheus and Grafana for system monitoring, as well as ELK Stack for logging and real-time analysis, which helps in maintaining system health and performance.

Q5: How do you ensure security in your DevOps processes?

I integrate security practices into the development lifecycle (DevSecOps) by conducting regular security assessments, using automated security scanning tools, and ensuring compliance with security policies.

Software Engineer Interview Questions

Q1: Can you describe your experience with secure coding practices?

I follow secure coding principles by validating input, implementing proper authentication and authorization, and regularly reviewing and testing code for vulnerabilities to prevent common security threats such as SQL injection and cross-site scripting.

Q2: What programming languages are you proficient in?

I am proficient in languages such as Python, Java, and JavaScript, and I have experience in developing applications that require robust security measures.

Q3: How do you approach debugging your code?

I use a systematic approach to debugging by isolating the problem, utilizing debugging tools, reviewing logs, and writing test cases to reproduce the issue, which helps in efficiently identifying and fixing bugs.

Q4: Describe a project where you implemented a security feature.

In a recent project, I implemented OAuth 2.0 for secure user authentication, ensuring that user credentials were never exposed and improving the overall security of the application.

Q5: How do you stay current with new technologies and programming languages?

I regularly participate in online courses, attend tech meetups, and contribute to open-source projects to learn about new technologies and keep my skills updated.

Product Manager Interview Questions

Q1: How do you prioritize features for a new product?

I prioritize features based on customer feedback, market research, and strategic alignment with business goals, often using frameworks like the MoSCoW method to categorize features into must-have, should-have, could-have, and won't-have.

Q2: Can you explain how you gather requirements from stakeholders?

I conduct interviews, surveys, and workshops with stakeholders to gather their needs and expectations. I also analyze market trends and competitor offerings to inform product direction.

Q3: Describe a successful product launch you managed.

I led the launch of a new security product that included conducting market research, coordinating with development and marketing teams, and ensuring proper training for sales staff. The product exceeded initial sales targets by 30% in the first quarter.

Q4: How do you measure the success of a product post-launch?

I track key performance indicators (KPIs) such as user adoption rates, customer satisfaction scores, and revenue growth to assess the product's success. Additionally, I gather user feedback for continuous improvement.

Q5: What methodologies do you use in product management?

I employ Agile methodologies, particularly Scrum, to manage product development. This allows for iterative development, frequent reassessment, and flexibility in responding to changes in requirements or market conditions.

securonix Interview Guide

Company Background and Industry Position

Securonix has carved a notable niche in the cybersecurity landscape, specializing in next-generation security analytics and threat detection. Founded over a decade ago, the company rides the wave of digital transformation by offering solutions that combine machine learning, big data, and behavioral analytics to preempt cyber threats. Unlike traditional security firms that rely heavily on signature-based detection, Securonix’s approach reflects a modern mindset—proactive, adaptive, and intelligence-driven.

Within this highly competitive market, Securonix stands out not just because of its technology but also because of its agility as a scale-up with enterprise-level clients. It competes head-to-head with giants like Splunk and IBM QRadar but appeals to organizations looking for more nuanced and scalable threat detection capabilities. This positioning impacts the company's talent acquisition strategy—they need sharp, innovative minds who can keep pace with rapid product evolution and complex client demands.

How the Hiring Process Works

  1. Application Screening: After submitting your resume and cover letter, be prepared for a thorough initial screening. Recruiters seek not only technical qualifications but also cultural fit clues—Securonix values adaptability and continuous learning.
  2. Recruiter Phone Interview: This is a relatively brief call focusing on your background, motivations, and a few behavioral questions. The recruiter aims to see if your expectations align with the role and company culture.
  3. Technical Assessment: Depending on the job role, this could be a coding challenge, case study, or hands-on technical test. The emphasis is on problem-solving, analytical thinking, and relevant technical skills rather than rote memorization.
  4. Technical Interview Rounds: Usually 1–2 rounds with engineering leads or managers. These dives deep into your expertise in cybersecurity concepts, programming languages, cloud security, or data analytics aligned to the role.
  5. HR and Leadership Interview: A more open-ended discussion involving cultural fit, career aspirations, and situational questions designed to assess communication skills and alignment with Securonix values.
  6. Offer and Negotiation: Successful candidates receive offers typically within a week of the final interview. The offer includes salary, benefits, and potential bonuses aligned with industry standards.

This layered approach reflects Securonix’s attention to both technical competence and cultural cohesion—a strategy that helps minimize mismatches and turnover.

Interview Stages Explained

Recruiter Screen – Setting the Tone

The recruiter call is more than a formality—it’s your chance to demonstrate genuine enthusiasm and clarity about the role. Candidates often underestimate how much recruiters pay attention to communication skills here. They want to see if you can articulate your experiences and interest without sounding rehearsed. It’s a two-way street, where you should also gauge if the company’s pace and mission resonate with you.

Technical Assessment – The Gatekeeper

Technical tests at Securonix are designed with precision. For example, a software engineer role might require coding on platforms like HackerRank or a custom portal. Security analysts might face scenario-based questions testing incident response or threat hunting skills. The test is less about passing with a perfect score and more about demonstrating your approach to problem-solving. Many candidates find this stage challenging because it requires not just technical knowledge but also time management under pressure.

Technical Interviews – Deep Dives With Experts

Once past the assessment, expect in-depth conversations with senior engineers or team leads. These interviews balance technical validation and exploratory dialogue. You might be asked to walk through your previous projects, explain your reasoning for architectural decisions, or debug code snippets on the spot. This stage also probes your understanding of cybersecurity frameworks and tools, like SIEMs (Security Information and Event Management) or UEBA (User and Entity Behavior Analytics), which are central to Securonix’s offerings.

Unlike some companies with rigid scripts, Securonix interviewers tend to adapt questions dynamically depending on your responses, which can feel unpredictable but rewarding if you think on your feet.

HR Interview – The Cultural Fit Check

This final round isn’t just about being “nice.” It’s a strategic step aiming to evaluate your long-term compatibility with the company’s values—innovation, accountability, and continuous improvement. Think behavioral questions like how you handled failure or collaborated across teams. The HR interviewer also clarifies expectations about work-life balance, remote work policies, and growth pathways, so it’s an opportunity for your own due diligence.

Examples of Questions Candidates Report

  • “Explain a time when you detected a security threat and the steps you took to mitigate it.”
  • “Write a function to parse and analyze log files for anomalous activities.”
  • “How would you design a scalable system for real-time threat detection across multiple data sources?”
  • “Describe your experience with cloud security, particularly AWS or Azure environments.”
  • “What motivates you about working in cybersecurity, and how do you stay updated on emerging threats?”
  • “Tell us about a challenging project and how you managed cross-functional collaboration.”
  • “Walk us through the reasons for architectural choices in a previous security analytics tool you worked on.”

Eligibility Expectations

Securonix generally looks for candidates with a strong educational background—typically a bachelor’s degree in computer science, information security, or related disciplines. But that’s just the baseline. They heavily weigh practical experience and certifications like CISSP, CEH, or cloud provider certifications. For data science or engineering roles, proficiency in programming languages like Python, Java, or Scala is a must.

Moreover, the company values demonstrated problem-solving abilities and familiarity with cybersecurity ecosystems. This means that even fresh graduates who completed relevant internships or personal projects can be competitive, as long as they articulate their learning curve and motivation clearly.

Common Job Roles and Departments

Securonix’s product ecosystem necessitates a variety of specialized roles. Here’s a snapshot:

  • Security Analysts: Focus on threat intelligence, incident response, and forensic analysis within Securonix’s platforms.
  • Software Engineers: Build and optimize core components of the security analytics software, often working on machine learning integrations.
  • Data Scientists: Develop and refine algorithms that detect anomalous behavior and potential threats.
  • Cloud Security Specialists: Ensure secure deployment and management of solutions on cloud infrastructure.
  • Product Managers: Translate client needs into evolving features while coordinating cross-functional teams.
  • Customer Success and Technical Support: Act as a bridge between clients and development teams, crucial for retention and feedback.

Compensation and Salary Perspective

RoleEstimated Salary
Security Analyst$80,000 - $110,000
Software Engineer$100,000 - $140,000
Data Scientist$110,000 - $150,000
Cloud Security Engineer$120,000 - $160,000
Product Manager$115,000 - $160,000
Technical Support Specialist$70,000 - $95,000

These ranges fluctuate depending on geography, experience, and market demand. Securonix also offers competitive benefits and potential equity, reflecting its growth stage. Compared to industry averages, salaries are generally in line with what you’d expect from a tech-focused cybersecurity firm in the U.S.

Interview Difficulty Analysis

Many candidates find the Securonix hiring process moderately challenging but fair. It is not a mere checkbox exercise; the technical rounds can be intense because interviewers expect you to demonstrate not only knowledge but practical application. For instance, the technical assessment can feel like a mini project under time constraints, which is stressful but realistic to the actual job.

The unpredictability of follow-up questions during technical interviews requires a strong conceptual grasp rather than rote preparation, making it crucial to focus on fundamentals. On the flip side, the HR rounds provide a breathing space with more conversational interaction.

In the grand scheme of cybersecurity companies, Securonix is somewhere in the middle—harder than entry-level but not as grueling as the tech giants’ multi-day coding gauntlets.

Preparation Strategy That Works

  • Build a solid foundation in cybersecurity principles and current industry tools—reading recent threat reports or whitepapers helps.
  • Practice coding problems relevant to your role, especially data parsing, algorithms, and system design.
  • Review the Securonix product suite online to frame your answers with relevant context.
  • Prepare detailed but concise stories about your experiences, emphasizing problem-solving and collaboration.
  • Mock technical interviews can be invaluable, especially to get used to thinking aloud and explaining your reasoning.
  • Brush up on cloud security concepts since many roles intersect with AWS, Azure, or GCP environments.
  • Get comfortable with behavioral questions—reflect on your career journey, challenges, and learnings.

This approach won’t just prepare you for questions but helps you align your mindset with the company’s expectations, which is often the hidden key.

Work Environment and Culture Insights

From what insiders share, Securonix fosters a collaborative environment that values innovation without the layers of bureaucracy typical in bigger firms. The pace is fast but balanced—the leadership encourages experimentation but within an accountable framework. This means you’re expected to own your work but supported by a team-oriented culture.

Work-life balance varies by role but the company is mindful about burnout, especially given the high-stress nature of cybersecurity. Remote work options have become more flexible post-pandemic, though some teams prefer hybrid or on-site setups to facilitate brainstorming sessions and knowledge sharing.

Career Growth and Learning Opportunities

The company’s rapid growth trajectory means there is room to move laterally or upwards relatively quickly if you demonstrate impact and commitment. They invest in continuous learning, providing access to training, certifications, and conferences. For ambitious candidates, this is a place where you can deepen both technical and leadership skills organically.

One interesting aspect is cross-functional exposure—engineers often collaborate closely with product and customer success teams, which broadens perspectives. Candidates who value hitting multiple career dimensions find this environment enriching.

Real Candidate Experience Patterns

Most candidates recount a respectful and well-organized interview process, though some mention occasional delays in communication between rounds. The technical rounds stand out as the most memorable part—challenging but fair, with interviewers genuinely interested in your thought process.

A common sentiment is that cultural fit matters a lot. Interviewers are attentive to whether you appear adaptable and eager to learn, not just technically proficient. Several candidates appreciated the transparency during the HR rounds about expectations and company culture, which helped them decide if Securonix felt right.

On the flip side, a few candidates felt the technical assessment was time-pressured and wished for more clarity upfront about what to expect.

Comparison With Other Employers

When lined up against other cybersecurity employers like Palo Alto Networks, CrowdStrike, or McAfee, Securonix offers a more specialized, analytics-driven niche. While the technical rigor is comparable, Securonix’s smaller size translates into a less corporate, more entrepreneurial vibe.

Compared to tech giants such as Google or Microsoft’s security teams, the interview rounds may be shorter and more focused on domain expertise rather than broad algorithmic challenges. This can be a breath of fresh air for seasoned cybersecurity professionals who want to showcase applied skills rather than generalized coding prowess.

Salary and benefits fall in mid to upper mid-tier ranges in the industry, with some trade-offs in global scale versus growth potential.

Expert Advice for Applicants

Focus on telling your story—not just reciting technical facts. Hiring managers want to understand your problem-solving mindset and how you handle real-world challenges. Don’t be afraid to ask clarifying questions during interviews; this shows critical thinking.

Invest time in understanding Securonix’s products and market position, even if you are applying for a purely technical role. It demonstrates initiative and prepares you to discuss how your skills align with their mission.

Remember, the hiring process is as much about your fit for the company as it is about the company’s fit for your career goals. Use HR interviews to probe growth opportunities and team dynamics.

Frequently Asked Questions

What types of interview questions does Securonix typically ask?

You can expect a blend of technical questions related to cybersecurity concepts, programming, and system design, along with behavioral questions exploring your teamwork and problem-solving experiences.

How many recruitment rounds should I anticipate?

Usually, candidates go through 4 to 6 rounds, including recruiter screening, technical assessments, one or two technical interviews, and an HR discussion.

Is prior cybersecurity experience mandatory?

While beneficial, some roles allow entry with strong technical skills and a demonstrated passion for security. Certifications and relevant internships can compensate for limited professional experience.

What is the typical salary range offered by Securonix?

Depending on the role and experience, salaries range from $70,000 for entry-level support roles to upwards of $160,000 for senior engineering and product management positions.

How should I prepare for the technical interview rounds?

Focus on understanding security frameworks, coding exercises relevant to your field, and being able to articulate your thought process clearly. Practice mock interviews and familiarize yourself with Securonix’s products and industry challenges.

Final Perspective

Landing a job at Securonix is a rewarding challenge that tests both your technical chops and your alignment with a fast-evolving cybersecurity culture. Their interview process is thoughtfully designed to assess practical skills and personal fit, reflecting the company’s commitment to innovation and collaboration.

For candidates, this means thorough preparation beyond just technical knowledge—engage deeply with the company's mission, prepare real stories that showcase your problem-solving agility, and be ready for dynamic interviews that reflect real-world complexities. Securonix isn’t just hiring employees; they’re looking for partners in securing tomorrow’s digital frontier.

securonix Interview Questions and Answers

Updated 21 Feb 2026

Sales Engineer Interview Experience

Candidate: Emily R.

Experience Level: Entry-level

Applied Via: Job fair

Difficulty:

Final Result:

Interview Process

2 rounds

Questions Asked

  • Explain a complex technical concept to a non-technical audience.
  • Describe your experience with CRM tools.
  • How do you handle objections during sales?
  • What interests you about cybersecurity?
  • Behavioral: Give an example of teamwork.

Advice

Gain more technical knowledge about security products and improve communication skills.

Full Experience

The first round was a phone interview focusing on communication and basic technical knowledge. I felt underprepared for some questions about the product portfolio. The interviewer was friendly and gave helpful feedback.

Product Manager Interview Experience

Candidate: David P.

Experience Level: Mid-level

Applied Via: Recruiter outreach

Difficulty:

Final Result:

Interview Process

3 rounds

Questions Asked

  • How do you prioritize features for a security product?
  • Describe your experience working with engineering teams.
  • What metrics do you track for product success?
  • How would you handle conflicting stakeholder demands?
  • Behavioral: Tell me about a challenging project you managed.

Advice

Focus on product management skills and understanding of cybersecurity market.

Full Experience

The interview process included a recruiter call, a case study presentation, and a final interview with senior leadership. The case study involved creating a roadmap for a new security analytics feature. Feedback was positive and the team was collaborative.

Data Scientist Interview Experience

Candidate: Cynthia L.

Experience Level: Senior

Applied Via: LinkedIn job post

Difficulty: Hard

Final Result:

Interview Process

3 rounds

Questions Asked

  • Explain how you would detect insider threats using data analytics.
  • Describe your experience with machine learning models in cybersecurity.
  • How do you handle imbalanced datasets?
  • Walk me through a project where you improved threat detection accuracy.
  • Behavioral: How do you handle conflicting priorities?

Advice

Demonstrate strong analytical skills and cybersecurity knowledge.

Full Experience

The interviews were technical and scenario-based, focusing on applying data science to security problems. The team valued clear communication and practical examples from my past work. The process was intense but rewarding.

Software Engineer Interview Experience

Candidate: Brian K.

Experience Level: Entry-level

Applied Via: Referral from current employee

Difficulty:

Final Result:

Interview Process

4 rounds

Questions Asked

  • Implement a function to detect anomalies in a data stream.
  • Explain object-oriented programming principles.
  • Describe your experience with cloud platforms.
  • How would you optimize a slow-running query?
  • Behavioral: Describe a time you worked in a team under pressure.

Advice

Prepare coding problems thoroughly and understand system design basics.

Full Experience

The process involved an initial phone screen, a coding challenge, a technical interview with system design questions, and a final behavioral round. The coding challenge was timed and required efficient algorithms. Feedback was constructive.

Security Analyst Interview Experience

Candidate: Alice M.

Experience Level: Mid-level

Applied Via: Online application via company website

Difficulty:

Final Result:

Interview Process

3 rounds

Questions Asked

  • Explain the difference between IDS and IPS.
  • Describe a time you identified a security threat.
  • How do you stay updated on cybersecurity trends?
  • What is SIEM and how does it work?
  • Walk me through a recent security incident you handled.

Advice

Brush up on security fundamentals and be ready to discuss real-life scenarios.

Full Experience

The interview process started with an HR screening, followed by a technical interview focusing on security concepts and incident response. The final round was a panel interview where I discussed my previous experience and problem-solving skills. The team was friendly and the questions were practical.

View all interview questions

Frequently Asked Questions in securonix

Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.

Common Interview Questions in securonix

Q: A man has a wolf, a goat, and a cabbage. He must cross a river with the two animals and the cabbage. There is a small rowing-boat, in which he can take only one thing with him at a time. If, however, the wolf and the goat are left alone, the wolf will eat the goat. If the goat and the cabbage are left alone, the goat will eat the cabbage. How can the man get across the river with the two animals and the cabbage?

Q: A hare and a tortoise have a race along a circle of 100 yards diameter. The tortoise goes in one directionand the hare in the other. The hare starts after the tortoise has covered 1/5 of its distance and that too leisurely.The hare and tortoise meet when the hare has covered only 1/8 of the distance. By what factor should the hareincrease its speed so as to tie the race?

Q: A rich merchant had collected many gold coins. He did not want anybody to know about them. One day his wife asked, "How many gold coins do we have?" After pausing a moment, he replied, "Well! If I divide the coins into two unequal numbers, then 32 times the difference between the two numbers equals the difference between the squares of the two numbers."The wife looked puzzled. Can you help the merchant's wife by finding out how many gold coins they have?

Q: Suppose a newly-born pair of rabbits, one male, one female, are put in a field. Rabbits are able to mate at the age of one month so that at the end of its second month a female can produce another pair of rabbits. Suppose that our rabbits never die and that the female always produces one new pair (one male, one female) every month from the second month on.

Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?

Q: Consider a pile of Diamonds on a table. A thief enters and steals 1/2 of the total quantity and then again 2 extra from the remaining. After some time a second thief enters and steals 1/2 of the remaining+2. Then 3rd thief enters and steals 1/2 of the remaining+2. Then 4th thief enters and steals 1/2 of the remaining+2. When the 5th one enters he finds 1 diamond on the table. Find out the total no. of diamonds originally on the table before the 1st thief entered.

Q: There are two balls touching each other circumferencically. The radius of the big ball is 4 times the diameter of the small all. The outer small ball rotates in anticlockwise direction circumferencically over the bigger one at the rate of 16 rev/sec. The bigger wheel also rotates anticlockwise at N rev/sec. What is 'N' for the horizontal line from the centre of small wheel always is horizontal.

Q: 36 people {a1, a2, ..., a36} meet and shake hands in a circular fashion. In other words, there are totally 36 handshakes involving the pairs, {a1, a2}, {a2, a3}, ..., {a35, a36}, {a36, a1}. Then size of the smallest set of people such that the res...

Q: T, U, V are 3 friends digging groups in fields. If T & U can complete i groove in 4 days &, U & V can complete 1 groove in 3 days & V & T can complete in 2 days. Find how many days each takes to complete 1 groove individually.

Q: The citizens of planet nigiet are 8 fingered and have thus developed their decimal system in base 8. A certain street in nigiet contains 1000 (in base 8) buildings numbered 1 to 1000. How many 3s are used in numbering these buildings?

Q: A light bulb is hanging in a room. Outside of the room there are three switches, of which only one is connected to the lamp. In the starting situation, all switches are 'off' and the bulb is not lit. If it is allowed to check in the room only once.How would you know which is the switch?

Q: ABCDE are sisters. Each of them gives 4 gifts and each receives 4 gifts No two sisters give the same combination ( e.g. if A gives 4 gifts to B then no other sisters can give four to other one.) (i) B gives four to A.(ii) C gives 3 to E. How much did A,B,C,E give to D?

Q: At 6?o a clock ticks 6 times.The time between first and last ticks is 30 seconds.How long does it tick at 12?o clock?2.A hotel has 10 storey. Which floor is above the floor below the floor, below the floor above the floor, below the floor above the fifth.

Q: There is a room with a door (closed) and three light bulbs. Outside the room there are three switches, connected to the bulbs. You may manipulate the switches as you wish, but once you open the door you can't change them. Identify each switch with its bulb.

Q: A long, long time ago, two Egyptian camel drivers were fighting for the hand of the daughter of the sheik of Abbudzjabbu. The sheik, who liked neither of these men to become the future husband of his daughter, came up with a clever plan: a race would dete

Q: There are 7 letters A,B,C,D,E,F,GAll are assigned some numbers from 1,2 to 7.B is in the middle if arranged as per the numbers.A is greater than G same as F is less than C.G comes earlier than E.Which is the fourth letter

Q: Raj has a jewel chest containing Rings, Pins and Ear-rings. The chest contains 26 pieces. Raj has 2 and 1/2 times as many rings as pins, and the number of pairs of earrings is 4 less than the number of rings. How many earrings does Raj have?...

Q: There are four dogs/ants/people at four corners of a square of unit distance. At the same instant all of them start running with unit speed towards the person on their clockwise direction and will always run towards that target. How long does it take for them to meet and where?

Q: Consider a series in which 8 teams are participating. each team plays twice with all other teams. 4 of them will go to the semi final. How many matches should a team win, so that it will ensure that it will go to semi finals.?

Q: An escalator is descending at constant speed. A walks down and takes 50 steps to reach the bottom. B runs down and takes 90 steps in the same time as A takes 10 steps. How many steps are visible when the escalator is not operating. 

Similar Companies Interview Questions