Skip to main content

Interview Questions

Review this list of 21 interview questions and answers verified by hiring managers and candidates.
  • +2

    "Referring to https://www.forbes.com/sites/forbesbusinesscouncil/2022/03/23/15-strategies-for-balancing-competing-stakeholder-priorities/?sh=7c82aa68262f Understand the conflicting priorities and align it with the goal/ objectives and the company mission. Start with the Least Common Denominator between the conflicting priorities to come to a commonality and start from there to objectively approach the next imp priority Always keep communication on and be transparent with 'equality' an"

    Pramod V. - "Referring to https://www.forbes.com/sites/forbesbusinesscouncil/2022/03/23/15-strategies-for-balancing-competing-stakeholder-priorities/?sh=7c82aa68262f Understand the conflicting priorities and align it with the goal/ objectives and the company mission. Start with the Least Common Denominator between the conflicting priorities to come to a commonality and start from there to objectively approach the next imp priority Always keep communication on and be transparent with 'equality' an"See full answer

    Product Manager
    Behavioral
    +6 more
  • "Any answer after this video won't compare. Not an expert. With that caveat out of the way, here is my answer I'd break this work into different phases = Discovery Phase, Planning Phase, Execution Phase, Monitoring phase, Ongoing Discovery : How many Products does this enterprise have? Are we talking about internally developed Products that we sell in the market place? or also third party Products that our enterprise has purchased for internal use? Should we include Operating Systems, net"

    Adib M. - "Any answer after this video won't compare. Not an expert. With that caveat out of the way, here is my answer I'd break this work into different phases = Discovery Phase, Planning Phase, Execution Phase, Monitoring phase, Ongoing Discovery : How many Products does this enterprise have? Are we talking about internally developed Products that we sell in the market place? or also third party Products that our enterprise has purchased for internal use? Should we include Operating Systems, net"See full answer

    Program Sense
  • Software Engineer
    System Design
  • Anthropic logoAsked at Anthropic 
    Add answer
    Hardware Engineer
    Behavioral
    +1 more
  • Microsoft logoAsked at Microsoft 
    1 answer

    "Clarifying and assumption When we say financial security, are we talking about authentication, fraud detection or money laundering? Assumption: Fraud detection. Focusing specifically on transaction-level fraud. Is this an internal AI implementation or an external third-party service we provide to multiple financial businesses? Assumption: External Third-party AI financial security product. Requirements Need to detect when fraudulent transactions happen. **Detection stra"

    Darpan D. - "Clarifying and assumption When we say financial security, are we talking about authentication, fraud detection or money laundering? Assumption: Fraud detection. Focusing specifically on transaction-level fraud. Is this an internal AI implementation or an external third-party service we provide to multiple financial businesses? Assumption: External Third-party AI financial security product. Requirements Need to detect when fraudulent transactions happen. **Detection stra"See full answer

    Product Manager
    Product Strategy
    +1 more
  • 🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.

  • Meta logoAsked at Meta 
    1 answer

    "Before we head into this - let's redefine this question to identify some objectives and key results: re-Design FB security privacy intimacy a few questions I want to clarify are: Is this for desktop, mobi web, or apps? Apps Is this for US only? Yes May I assume some resources available for me? Such as Designers, Data Scientists, Developers? Sure ----- Okay let me think about this for a min ---- I'd like to start off by: Thinking about th"

    Amy M. - "Before we head into this - let's redefine this question to identify some objectives and key results: re-Design FB security privacy intimacy a few questions I want to clarify are: Is this for desktop, mobi web, or apps? Apps Is this for US only? Yes May I assume some resources available for me? Such as Designers, Data Scientists, Developers? Sure ----- Okay let me think about this for a min ---- I'd like to start off by: Thinking about th"See full answer

    Product Design
    System Design
  • Anthropic logoAsked at Anthropic 
    Add answer
    Software Engineer
    Behavioral
    +1 more
  • Solutions Architect
    Technical
  • Google Cloud (GCP) logoAsked at Google Cloud (GCP) 
    1 answer

    "First of all, there are different industries with different business in security measures which influence trends in the security industry as information they store and infrastructure they have are not the same. In this exercise, I'll take a look at the security industry in general and talk about the biggest trends from the perspectives of "lines of defense" for software in particular in: identify, data (on client and server side) and infrastructure. There are several topics associated with each"

    Shin K. - "First of all, there are different industries with different business in security measures which influence trends in the security industry as information they store and infrastructure they have are not the same. In this exercise, I'll take a look at the security industry in general and talk about the biggest trends from the perspectives of "lines of defense" for software in particular in: identify, data (on client and server side) and infrastructure. There are several topics associated with each"See full answer

    Product Manager
    Product Strategy
  • Microsoft logoAsked at Microsoft 
    1 answer

    "Before we jump into discussion , few Qs which come to my mind in order to narrow the scope are: What kind of security system we are thinking . What do we want to achieve? Is there any biz goal in mind. What security related pain points are we trying to solve. What is the kind of hotel - is it a vacation rental , standalone hotel, highway motel, big chain resorts? What are the current systems being used. I think most of hotels have closed circuit cameras , fire alarms installed in"

    Samarth S. - "Before we jump into discussion , few Qs which come to my mind in order to narrow the scope are: What kind of security system we are thinking . What do we want to achieve? Is there any biz goal in mind. What security related pain points are we trying to solve. What is the kind of hotel - is it a vacation rental , standalone hotel, highway motel, big chain resorts? What are the current systems being used. I think most of hotels have closed circuit cameras , fire alarms installed in"See full answer

    Product Design
    Technical
  • CrowdStrike logoAsked at CrowdStrike 
    Add answer
    Security Engineer
    Behavioral
    +1 more
  • Dell logoAsked at Dell 
    3 answers

    "Conduct a competitive analysis: Research the competitive landscape to identify gaps and opportunities that your product can capitalize on. Develop a business case: Document the value of your product, including projected growth, expected return on investment, and potential risk factors. Establish partnerships: Develop relationships with key stakeholders and partners who can help provide resources and funding for your product. Secure executive support: Present yo"

    Shivam S. - "Conduct a competitive analysis: Research the competitive landscape to identify gaps and opportunities that your product can capitalize on. Develop a business case: Document the value of your product, including projected growth, expected return on investment, and potential risk factors. Establish partnerships: Develop relationships with key stakeholders and partners who can help provide resources and funding for your product. Secure executive support: Present yo"See full answer

    Product Manager
    Behavioral
  • Qualtrics logoAsked at Qualtrics 
    1 answer

    "Suppliers have an interest in the purchase of inputs by the company. They want companies to pay on time"

    Chelsey V. - "Suppliers have an interest in the purchase of inputs by the company. They want companies to pay on time"See full answer

    Technical Program Manager
    Behavioral
  • Google logoAsked at Google 
    1 answer

    "Since I am residing in Bangalore, I will consider the Bengaluru airport. The airport has 2 terminals. I am going to consider the security scan done at both the terminals for the estimation. Does it include security scans for both international and domestic flights? --> Both The airport crew members and pilots also go through the security scan. So, should I include only them as well or only the passengers in my calculation? --> Only the passengers Number of people going through the security scan"

    Sangeeta P. - "Since I am residing in Bangalore, I will consider the Bengaluru airport. The airport has 2 terminals. I am going to consider the security scan done at both the terminals for the estimation. Does it include security scans for both international and domestic flights? --> Both The airport crew members and pilots also go through the security scan. So, should I include only them as well or only the passengers in my calculation? --> Only the passengers Number of people going through the security scan"See full answer

    Product Manager
    Estimation
    +1 more
  • Huge logoAsked at Huge 
    Add answer
    Behavioral
  • JP Morgan Chase logoAsked at JP Morgan Chase 
    1 answer

    "Testing"

    Bit P. - "Testing"See full answer

    Behavioral
    Technical
  • Amazon logoAsked at Amazon 
    Add answer
    Security Engineer
    Technical
    +1 more
  • Meta logoAsked at Meta 
    Add answer
    Security Engineer
    Technical
  • Amazon logoAsked at Amazon 
    Add answer
    Security Engineer
    Technical
  • Security Analyst
    Technical
Showing 1-20 of 21