Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Professional Development

10 Qs

quiz-placeholder

Similar activities

Artificial Intelligence Quiz

Artificial Intelligence Quiz

Professional Development

10 Qs

Do You Really Know Boy Perfect?

Do You Really Know Boy Perfect?

KG - Professional Development

10 Qs

HPE SimpliVIty - Tech Pro

HPE SimpliVIty - Tech Pro

Professional Development

10 Qs

Microsoft Secure Score

Microsoft Secure Score

Professional Development

10 Qs

IOT Webminar

IOT Webminar

Professional Development

10 Qs

INTERBANK

INTERBANK

Professional Development

10 Qs

IT Jargon

IT Jargon

7th Grade - Professional Development

9 Qs

Computer Science Primary, Secondary Memory and Data Storage

Computer Science Primary, Secondary Memory and Data Storage

Professional Development

15 Qs

Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Tanya Aisley

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the top vulnerability reported to a bug bounty program?

  1. Misconfiguration

  1. Cross-site scripting (XSS)

  1. Sensitive information disclosure

  1. Business logic errors

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: According to 8th edition of Hacker-Powered Security Report 2024-25, HackerOne has seen a 67% increase in pentesting over the past year.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the average number of researchers on a high-impact program?

  1. 34

  1. 9

  1. 56

  1. 171

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Jasmin Landry, Security Researcher and HackerOne Pentester, cited in 8th edition of Hacker-Powered Security Report 2024-25, what is a significant risk posed by AI?

  1. Training-data leaks

  1. Unauthorized AI usage within organizations

  1. The hacking of AI models by external parties

  1. AI introducing more vulnerabilities

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

  1.  What are some recommendations for running a top-tier security program found in the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Offer constructive feedback on reports.

  1. Offer the highest bounties possible.

  1. Clearly communicate expected response times.

  1. Respond to researchers with respect and professionalism.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: The concept of return on mitigation (ROM) was recently introduced by HackerOne.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three key traits of high-impact bug bounty programs according to the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Higher bounties

  1. Smaller, focused communities

  1. Stricter acceptance criteria for researchers

  1. Broader testing scope

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?