sisa information security Recruitment Process, Interview Questions & Answers

Sisa Information Security’s hiring involves an initial technical screening followed by practical problem-solving tasks. Candidates can expect rounds focused on cybersecurity fundamentals and scenario-based evaluations to assess analytical skills.
4.3
based on 50 Reviews
About Company
Interview Guide
Interviews Experiance
FAQ's Questions

About sisa information security

Company Description

Sisa Information Security is a leading provider of cybersecurity solutions, dedicated to protecting organizations from emerging threats in the digital landscape. Founded by a team of seasoned experts, Sisa has established a reputation for innovation and excellence in information security. The company thrives in a dynamic work culture that emphasizes collaboration, continuous learning, and adaptability. Employees are encouraged to think creatively and stay ahead of the curve in a rapidly evolving industry. With a focus on work-life balance, Sisa fosters an environment where team members can grow professionally while enjoying a supportive and inclusive atmosphere.

Cybersecurity Analyst Interview Questions

Q1: What do you understand about the role of a cybersecurity analyst?

A cybersecurity analyst is responsible for monitoring an organization's network for security breaches, conducting vulnerability assessments, and responding to incidents. Their primary goal is to protect sensitive data from cyber threats.

Q2: How do you stay updated with the latest cybersecurity threats?

I regularly follow cybersecurity news, subscribe to industry journals, and participate in webinars and conferences. Additionally, I am part of online forums and communities where professionals share insights and updates.

Q3: Can you explain what a firewall is and its purpose?

A firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its primary purpose is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet.

Q4: Describe a time when you had to respond to a security incident. What steps did you take?

In my previous role, we experienced a phishing attack. I immediately initiated the incident response plan, which included isolating the affected systems, analyzing the threat, and informing relevant stakeholders. After containment, we implemented additional training to prevent future incidents.

Q5: What tools do you use for threat detection and analysis?

I am proficient in using tools such as Wireshark for network analysis, Snort for intrusion detection, and various SIEM solutions like Splunk for log management and threat detection.

Penetration Tester Interview Questions

Q1: What is penetration testing, and why is it important?

Penetration testing, or ethical hacking, involves simulating cyber attacks on a system to identify vulnerabilities that could be exploited by malicious attackers. It is important because it helps organizations strengthen their security posture before actual attacks occur.

Q2: Describe your experience with penetration testing tools.

I have extensive experience with tools like Metasploit for exploiting vulnerabilities, Burp Suite for web application testing, and Nmap for network scanning. I use these tools to identify weaknesses and assess the security of systems.

Q3: Can you walk us through your penetration testing process?

My penetration testing process typically includes planning and reconnaissance, scanning for vulnerabilities, gaining access through exploitation, maintaining access, and finally reporting findings with recommendations for remediation.

Q4: How do you ensure that your penetration testing activities comply with legal and ethical standards?

I always obtain written consent from the organization before conducting any tests, adhere to agreed-upon scopes, and follow best practices and industry standards to ensure ethical behavior.

Q5: What are some common vulnerabilities you look for during a penetration test?

Common vulnerabilities include SQL injection, cross-site scripting (XSS), misconfigured servers, weak passwords, and outdated software. I prioritize these based on the potential impact they could have on the organization.

Security Consultant Interview Questions

Q1: What role does a security consultant play in an organization?

A security consultant advises organizations on how to protect their assets and data by assessing risks, recommending security measures, and helping implement security policies and protocols.

Q2: How do you approach a security assessment for a new client?

I start by understanding the client’s business model and specific security needs. Then, I perform a thorough risk assessment, analyze existing controls, and identify gaps before providing tailored recommendations.

Q3: What is your experience with compliance standards like GDPR or HIPAA?

I have worked with various organizations to ensure compliance with GDPR, HIPAA, and other standards by conducting audits, developing compliance programs, and training staff on necessary policies and procedures.

Q4: Can you describe a security project you managed? What challenges did you face?

I managed a project to implement a new security framework for a financial institution. A major challenge was aligning diverse stakeholder interests, but I facilitated communication and collaboration to ensure everyone was on board, ultimately leading to a successful rollout.

Q5: How do you measure the effectiveness of a security program?

I measure effectiveness through metrics such as the number of incidents detected, response times, audit results, user awareness training completion rates, and overall compliance with security policies.

By tailoring these questions and answers to the specific job roles at Sisa Information Security, candidates can be better prepared for interviews, demonstrating their knowledge and suitability for the positions.

sisa information security Interview Guide

Company Background and Industry Position

Sisa Information Security is carving a niche in the cybersecurity landscape, often praised for its innovative approach to risk management and threat detection. Founded just over a decade ago, it has grown from a modest startup into a respected player, especially in sectors like finance, healthcare, and critical infrastructure protection. What sets Sisa apart isn’t just the technology—it’s their emphasis on weaving security deeply into business processes, rather than treating it as an afterthought.

In an industry crowded with giants and disruptors alike, Sisa’s commitment to customized, client-focused security solutions has earned it both loyalty and a reputation for agility. For candidates eyeing a role here, understanding this position matters because you’re not just joining a cybersecurity vendor; you’re stepping into a culture that prioritizes adaptation and strategic foresight.

How the Hiring Process Works

  1. Application Screening: The journey typically starts with a resume filter emphasizing relevant certifications (like CISSP, CEH) and experience in penetration testing or incident response. This isn’t just HR ticking boxes; it’s about gauging if your background aligns with the company’s technical demands.
  2. Initial HR Interview: Here, recruiters explore cultural fit and motivation. They want to see if you understand Sisa’s core values and can articulate why you want to be part of their mission-driven security team.
  3. Technical Assessment: This can range from online coding challenges related to scripting for automation, to scenario-based questions testing your threat analysis skills. It’s designed to simulate real-world challenges you’d face on the job.
  4. Technical Interview Rounds: Conducted by senior engineers or security analysts, these sessions dive deep into your problem-solving abilities, knowledge of security protocols, and familiarity with tools like SIEM platforms, IDS/IPS, and vulnerability scanners.
  5. Managerial/Panel Interview: The last hurdle often includes discussions about your approach to leadership, project handling, and how you keep updated with evolving threats. This is where strategic thinking is evaluated beyond pure technical prowess.
  6. Offer and Negotiation: Successful candidates receive an offer outlining compensation and benefits. Negotiations here are fair but firm, reflecting the market value for your skill set and the company’s internal equity.

This layered process exists because information security isn’t just about technical knowledge; it demands a blend of situational awareness, teamwork, and continuous learning. Hiring rounds are structured to sift through technical aptitude and soft skills simultaneously.

Interview Stages Explained

Resume Screening and Eligibility Checks

At this stage, recruiters scan for key qualifications tailored to specific job roles—whether it’s a Security Analyst, Penetration Tester, or SOC Engineer. They look beyond degrees, focusing on practical experience and certifications. Why? Because in cybersecurity, hands-on skills often trump textbook knowledge.

HR Interview: Assessing Cultural and Motivational Fit

This is more than a chit-chat. Candidates usually feel this round probes their commitment to security as a career, adaptability to fast-changing threats, and alignment with Sisa’s collaborative work culture. It’s a critical filter; technical skills can be taught, but mindset and attitude are less malleable.

Technical Screening: Realistic Problem Solving Under Pressure

Practicality is key here. You might be given a simulated breach scenario and asked how you’d proceed. Interviewers assess your reasoning more than the ‘right’ answer. They want to see if you think like a defender, anticipate attacker moves, and communicate clearly under pressure.

Technical Interviews: Depth Over Breadth

These rounds aren’t about trick questions but tend to dig into your chosen specialization. For instance, if you’re interviewing as a Vulnerability Analyst, expect deep dives into CVSS scoring, patch management strategies, or scripting solutions to automate scans. They test not just knowledge but your ability to apply it.

Managerial and Panel Interviews: Strategy and Soft Skills

When you reach this phase, technical expertise is assumed. The focus shifts to your approach to team collaboration, conflict resolution, and keeping abreast of emerging threats. Panel interviews also evaluate how you articulate complex security concepts to non-technical stakeholders, a crucial skill in any security role.

Examples of Questions Candidates Report

  • “Describe a time you detected a sophisticated threat. What steps did you take to contain it?”
  • “How would you secure a cloud environment with multiple access points?”
  • “Explain the differences between symmetric and asymmetric encryption, and give real-world use cases for each.”
  • “Write a script to automate the scanning of a network segment and report vulnerabilities.”
  • “How do you stay updated with the latest cybersecurity trends and vulnerabilities?”
  • “What’s your approach when handling a disagreement within your security team about incident response priorities?”
  • “Walk us through the steps of a penetration test from planning to reporting.”
  • “Explain the concept of zero trust architecture and its relevance.”
  • “How would you communicate a severe security breach to a non-technical executive?”
  • “What are some limitations of traditional antivirus solutions in modern security environments?”

Eligibility Expectations

Sisa tends to look for candidates with at least 3-5 years of relevant experience in enterprise security environments, though entry-level roles exist for fresh graduates with strong internships or projects. A bachelor’s degree in computer science or related fields is often the baseline, but certifications can significantly tip the scales.

Certifications like CISSP, CEH, CompTIA Security+, or specialized ones like OSCP for penetration testers are highly regarded. Candidates lacking formal credentials might still succeed if they demonstrate exceptional practical skills, especially in scripting, incident response, or cloud security.

Soft skills are increasingly emphasized: communication, analytical thinking, and adaptability. The reason is simple—security is as much about managing human factors and policies as it is about technology.

Common Job Roles and Departments

Sisa’s structure reflects the complex nature of modern cybersecurity demands. Here are some typical roles you might encounter:

  • Security Analyst: Monitoring threats, analyzing logs, and responding to incidents.
  • Penetration Tester (Ethical Hacker): Simulating attacks to find vulnerabilities before adversaries do.
  • Security Engineer: Designing and implementing security architectures and tools.
  • Incident Response Specialist: Leading investigations and mitigating breach impacts.
  • Compliance and Risk Officer: Ensuring adherence to industry standards and regulatory frameworks.
  • Security Operations Center (SOC) Team Member: Central hub for threat detection and response.
  • Cloud Security Specialist: Focusing on securing cloud platforms like AWS, Azure, or Google Cloud.

Departments typically blend cross-functional teams to foster collaboration—security analysts often work closely with IT admins, developers, and management.

Compensation and Salary Perspective

RoleEstimated Salary
Security Analyst$70,000 - $90,000
Penetration Tester$85,000 - $120,000
Security Engineer$90,000 - $130,000
Incident Response Specialist$80,000 - $115,000
Compliance and Risk Officer$75,000 - $110,000
SOC Team Member$65,000 - $85,000
Cloud Security Specialist$95,000 - $140,000

These figures are approximate and vary based on experience, location, and negotiation. Compared to industry averages, Sisa offers competitive packages with room for bonuses tied to performance and certifications. Candidates often find the salary range aligns well with the growing demand for cybersecurity roles nationally.

Interview Difficulty Analysis

From what candidates share, Sisa’s interviews strike a balance between challenging and fair. The company avoids curveball questions aimed at intimidation. Instead, expect a steady elevation in difficulty as you proceed through rounds—starting with basic HR screening and culminating in scenario-heavy technical problem-solving.

Many report the technical interviews as the toughest part, especially when real-time scripting or on-the-spot threat analysis is required. However, the atmosphere tends to be collaborative rather than adversarial. Interviewers often give hints or clarifications, testing not just knowledge but learning agility and composure under scrutiny.

Comparatively, the difficulty level is on par with other mid-to-large cybersecurity firms—tough enough to filter but accessible for those genuinely prepared.

Preparation Strategy That Works

  • Deeply understand your own resume—be ready to discuss any project or tool listed in detail.
  • Brush up on fundamental security concepts: encryption, network protocols, threat models.
  • Practice scripting in languages common in security automation, like Python or Bash.
  • Use scenario-based learning—simulate incident response or penetration testing situations.
  • Stay current on vulnerabilities and threat actor tactics; reading resources like MITRE ATT&CK or recent CVEs helps.
  • Prepare to explain complex ideas simply—for both technical and HR rounds.
  • Mock interviews with peers can improve confidence and timing.
  • Gather insights from forums or community feedback about Sisa’s interview culture.

Work Environment and Culture Insights

From inside accounts, Sisa fosters a culture rooted in continuous learning and openness. The security team is often described as tight-knit but diverse, with a significant emphasis on mentorship. People talk about “no question is too basic” and management encouraging curiosity.

There’s a palpable sense that security is seen as an evolving craft rather than a fixed checklist. This mindset impacts daily workflows—they balance strict policy with flexibility to adapt as new threats emerge.

Work-life balance is reportedly reasonable, though high-priority incidents can demand extra effort. The culture also values transparency; leadership frequently shares updates about company direction and security priorities.

Career Growth and Learning Opportunities

Growth at Sisa isn’t just vertical. Employees have opportunities to cross-train in different security domains, an approach that the company actively supports. Formal training budgets and access to conferences are common perks.

Mentorship programs pair junior staff with experienced professionals—a practice that’s helped many accelerate their skill acquisition. Certifications are encouraged and sometimes funded, reflecting Sisa’s commitment to keeping its workforce sharp.

Job rotations, especially between SOC and incident response teams, are common, providing broad exposure. This is crucial in a field where knowing the end-to-end lifecycle of threats adds immeasurable value.

Real Candidate Experience Patterns

Talking to folks who’ve navigated the process reveals some recurring themes. Many feel the initial HR round is fairly relaxed, letting them talk about their passion and journey. That often eases nerves before the more demanding technical stages.

During technical interviews, candidates notice a genuine interest in their problem-solving approach rather than just right or wrong answers. Those with hands-on project experience tend to shine here.

Some candidates mention a slight surprise with the scripting requirement—especially if their background is more theoretical. It’s a reminder that practical skills are king at Sisa.

After offers, feedback is usually transparent—rejections come with constructive notes rather than vague excuses. This reflects a professional recruitment ethos that values candidate dignity.

Comparison With Other Employers

Compared to larger cybersecurity firms, Sisa’s recruitment process is slightly less bureaucratic, moving faster but still thorough. Unlike startups that may prioritize rapid hiring, Sisa maintains structured rounds emphasizing fit and skill depth.

Some candidates find that while the salary may not always match the biggest tech giants, the opportunity for hands-on experience and career development at Sisa is richer. The company’s focus on real-world applications and client-specific customization gives it an edge in practical exposure.

Where Sisa stands out is in its balanced emphasis on soft skills and technical competence—some competitors lean heavily on one or the other, but here both matter equally.

Expert Advice for Applicants

When prepping for a Sisa interview, don’t just memorize answers—understand the why behind security principles. Interviewers appreciate when candidates demonstrate curiosity and the ability to think through unknown problems.

Network with current or past employees if possible; their insights can help you anticipate interview nuances. Also, tailor your resume to highlight experiences directly relevant to the role—generic descriptions won’t make the cut.

During interviews, communicate clearly and ask clarifying questions if scenarios seem ambiguous. This shows critical thinking and attention to detail.

Finally, keep your learning curve visible—whether through certifications, side projects, or community involvement. Sisa values candidates who don’t just rest on their laurels.

Frequently Asked Questions

What is the typical duration of the Sisa interview process?

On average, candidates can expect the process to take between two to four weeks, depending on the role and scheduling availability. Some faster-track roles might wrap up in under two weeks, but thorough technical assessments naturally extend timelines.

Are coding skills mandatory for all information security roles at Sisa?

Not all roles require deep programming ability, but basic scripting knowledge (especially in Python or Bash) is often preferred. Roles such as Security Engineer or Penetration Tester usually demand stronger coding competence compared to compliance positions.

How important are industry certifications when applying?

Certifications significantly strengthen an application and sometimes are prerequisites. They validate your knowledge and commitment. However, exceptional practical experience can sometimes compensate for the lack of formal certifications.

What kind of technical interview questions can I expect?

Expect scenario-based questions involving threat detection, vulnerability analysis, network security protocols, and incident response planning. Additionally, you may be asked to demonstrate skills via scripting tasks or whiteboard problem solving.

Does Sisa provide feedback after interviews?

Yes, Sisa’s recruitment team strives to offer constructive feedback regardless of outcome, which is appreciated by candidates looking to improve.

Final Perspective

Diving into a career at Sisa Information Security is a decision that goes beyond landing a job; it’s about joining a forward-thinking team tackling real-world digital risks head-on. The interview process reflects this ethos—designed to uncover not just your current abilities but your potential to grow alongside an evolving threat landscape.

For job seekers, the key takeaway is preparation married with a genuine passion for security. Sisa values analytical minds that can adapt, communicate, and innovate. The hurdles may seem daunting, but for those who invest time in understanding both the company’s position and the nuances of the recruitment strategy, the payoff can be substantial—a rewarding role in an industry that literally shapes the digital future.

sisa information security Interview Questions and Answers

Updated 21 Feb 2026

Compliance Analyst Interview Experience

Candidate: Emma T.

Experience Level: Senior

Applied Via: Recruiter outreach

Difficulty:

Final Result: Rejected

Interview Process

3 rounds

Questions Asked

  • What compliance frameworks are you familiar with?
  • How do you ensure company policies meet regulatory requirements?
  • Describe a time you identified a compliance gap.
  • How do you handle audits?

Advice

Be ready to discuss specific frameworks and provide examples of compliance management.

Full Experience

After being contacted by a recruiter, I had three interviews including HR, technical, and with the compliance team lead. The questions were detailed and focused on regulatory knowledge. I was not selected but received constructive feedback.

Incident Response Specialist Interview Experience

Candidate: David S.

Experience Level: Mid-level

Applied Via: LinkedIn application

Difficulty:

Final Result:

Interview Process

3 rounds

Questions Asked

  • Describe your experience handling security incidents.
  • How do you communicate with stakeholders during a breach?
  • What tools do you use for forensic analysis?
  • Walk me through a recent incident you managed.

Advice

Prepare detailed examples of past incident handling and communication skills.

Full Experience

The process included an initial HR screening, a technical interview with scenario questions, and a final round with the department head. They valued my practical experience and communication approach.

Security Engineer Interview Experience

Candidate: Chloe L.

Experience Level: Entry-level

Applied Via: Job fair

Difficulty:

Final Result:

Interview Process

2 rounds

Questions Asked

  • What is a firewall and how does it work?
  • Explain the difference between symmetric and asymmetric encryption.
  • Have you worked with cloud security?
  • Describe a project where you improved security.

Advice

Focus on fundamentals and be honest about your experience level.

Full Experience

I met a recruiter at a job fair and applied for an internship. The first interview was a phone call covering basics, and the second was a video call with a technical team member. They appreciated my enthusiasm and willingness to learn.

Penetration Tester Interview Experience

Candidate: Brian K.

Experience Level: Senior

Applied Via: Referral from a current employee

Difficulty: Hard

Final Result: Rejected

Interview Process

4 rounds

Questions Asked

  • Describe your methodology for penetration testing.
  • How do you prioritize vulnerabilities?
  • Explain a complex exploit you have discovered.
  • Perform a live penetration test on a sample web app.
  • What tools do you prefer and why?

Advice

Prepare for hands-on technical tests and be ready to explain your approach in detail.

Full Experience

After a referral, I had an initial HR call, then two technical interviews including a live practical test. The final round was a discussion with senior management. The practical test was challenging and required deep knowledge of web app security. Despite good feedback, I was not selected.

Security Analyst Interview Experience

Candidate: Alice M.

Experience Level: Mid-level

Applied Via: Online application via company website

Difficulty:

Final Result:

Interview Process

3 rounds

Questions Asked

  • Explain the CIA triad in information security.
  • Describe a time you identified a security vulnerability.
  • How do you stay updated with the latest security threats?
  • Walk me through your experience with SIEM tools.

Advice

Brush up on practical security concepts and be ready to discuss real-world scenarios.

Full Experience

The process started with an online application, followed by a phone screening focusing on my background. The second round was a technical interview with scenario-based questions. The final round was with the team lead, focusing on cultural fit and problem-solving. Overall, the interviewers were friendly and professional.

View all interview questions

Frequently Asked Questions in sisa information security

Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.

Common Interview Questions in sisa information security

Q: In a sports contest there were m medals awarded on n successive days (n > 1). 1. On the first day 1 medal and 1/7 of the remaining m - 1 medals were awarded. 2. On the second day 2 medals and 1/7 of the now remaining medals was awarded; and so on.On the nth and last day, the remaining n medals were awarded.How many days did the contest last, and how many medals were awarded altogether?

Q: A man has a wolf, a goat, and a cabbage. He must cross a river with the two animals and the cabbage. There is a small rowing-boat, in which he can take only one thing with him at a time. If, however, the wolf and the goat are left alone, the wolf will eat the goat. If the goat and the cabbage are left alone, the goat will eat the cabbage. How can the man get across the river with the two animals and the cabbage?

Q: A hare and a tortoise have a race along a circle of 100 yards diameter. The tortoise goes in one directionand the hare in the other. The hare starts after the tortoise has covered 1/5 of its distance and that too leisurely.The hare and tortoise meet when the hare has covered only 1/8 of the distance. By what factor should the hareincrease its speed so as to tie the race?

Q: Consider a pile of Diamonds on a table. A thief enters and steals 1/2 of the total quantity and then again 2 extra from the remaining. After some time a second thief enters and steals 1/2 of the remaining+2. Then 3rd thief enters and steals 1/2 of the remaining+2. Then 4th thief enters and steals 1/2 of the remaining+2. When the 5th one enters he finds 1 diamond on the table. Find out the total no. of diamonds originally on the table before the 1st thief entered.

Q: There are two balls touching each other circumferencically. The radius of the big ball is 4 times the diameter of the small all. The outer small ball rotates in anticlockwise direction circumferencically over the bigger one at the rate of 16 rev/sec. The bigger wheel also rotates anticlockwise at N rev/sec. What is 'N' for the horizontal line from the centre of small wheel always is horizontal.

Q: At 6?o a clock ticks 6 times.The time between first and last ticks is 30 seconds.How long does it tick at 12?o clock?2.A hotel has 10 storey. Which floor is above the floor below the floor, below the floor above the floor, below the floor above the fifth.

Q: There are 7 letters A,B,C,D,E,F,GAll are assigned some numbers from 1,2 to 7.B is in the middle if arranged as per the numbers.A is greater than G same as F is less than C.G comes earlier than E.Which is the fourth letter

Q: Jarius and Kylar are playing the game. If Jarius wins, then he wins twice as many games as Kylar. If Jarius loses, then Kylar wins as the same number of games that Jarius wins. How many do Jarius and Kylar play before this match?

Q: In a Park, N persons stand on the circumference of a circle at distinct points. Each possible pair of persons, not standing next to each other, sings a two-minute song ? one pair immediately after the other. If the total time taken for singing is 28 minutes, what is N?

Q: Give two dice - one is a standard dice, the other is blank (nothing painted on any of the faces). The problem is to paint the blank dice in such a manner so that when you roll both of them together, the sum of both the faces should lie between 1 and 12. Numbers from 1-12 (both inclusive) equally likely.

Q: Given a collection of points P in the plane , a 1-set is a point in P that can be separated from the rest by a line, .i.e the point lies on one side of the line while the others lie on the other side. The number of 1-sets of P is denoted by n1(P)....

Q: Consider a series in which 8 teams are participating. each team plays twice with all other teams. 4 of them will go to the semi final. How many matches should a team win, so that it will ensure that it will go to semi finals.?

Q: An escalator is descending at constant speed. A walks down and takes 50 steps to reach the bottom. B runs down and takes 90 steps in the same time as A takes 10 steps. How many steps are visible when the escalator is not operating. 

Q: A man driving the car at twice the speed of auto one day he was driven car for 10 min. and car is failed. he left the car and took auto to go to the office .he spent 30 min. in the auto. what will be the time take by car to go office?

Q: There are some chickens in a poultry. They are fed with corn. One sack of corn will come for 9 days. The farmer decides to sell some chickens and wanted to hold 12 chicken with him. He cuts the feed by 10% and sack of corn comes for 30...

Q: In mathematics country 1,2,3,4....,8,9 are nine cities. Cities which form a no. that is divisible by 3 are connected by air planes. (e.g. cities 1 & 2 form no. 12 which divisible by 3 then 1 is connected to city 2). Find the total no. of ways you can go to 8 if you are allowed to break the journeys.

Q: Four persons have to cross the bridge they are having one torch light. Four persons take 1,2,5,10 minutes respectively, when two persons are going they will take the time of the slowest person. What is the time taken to cross by all of them.

Q: A is driving on a highway when the police fines him for over speeding and exceeding the limit by 10 km/hr. At the same time B is fined for over speeding by twice the amount by which A exceeded the limit. If he was driving at 35 km/hr what is the speed limit for the road?

Q: A 31" x 31" square metal plate needs to be fixed by a carpenter on to a wooden board. The carpenter uses nails all along the edges of the square such that there are 32 nails on each side of the square. Each nail is at the same distance from the neighboring nails. How many nails does the carpenter use? 

Q: Two unemployed young men decided to start a business together. They pooled in their savings, which came to Rs. 2,000. They were both lucky, their business prospered and they were able to increase their capital by 50 per cent every three years. How much did they have in all at the end of eighteen years?

Similar Companies Interview Questions