Your Dashboard
Interview Coaching
Learn
System Design
ML System Design
Code
Behavioral
Salary Negotiation
Interview Guides
Search
⌘K
Get Premium
Leetcode 3631. Sort Threats by Severity and Exploitability
Given a list of threat records with severity and exploitability metrics, rank them by primary key (severity) and secondary key (exploitability) according to the problem's tie-breaking rules. The task tests designing an efficient comparator/custom sort (stable as required) to produce the correct ordering under typical constraints (large n, possible equal or missing values).
Question Timeline
See when this question was last asked and where, including any notes left by other candidates.
All Regions
Comments
Hello Interview Premium
Your account is free and you can post anonymously if you choose.