Search
⌘K

Leetcode 3631. Sort Threats by Severity and Exploitability

Given a list of threat records with severity and exploitability metrics, rank them by primary key (severity) and secondary key (exploitability) according to the problem's tie-breaking rules. The task tests designing an efficient comparator/custom sort (stable as required) to produce the correct ordering under typical constraints (large n, possible equal or missing values).


Question Timeline

See when this question was last asked and where, including any notes left by other candidates.

Comments

Your account is free and you can post anonymously if you choose.