
Hacker-Powered Security Report 2024-25
Authored by Tanya Aisley
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to 8th edition of Hacker-Powered Security Report 2024-25, what is the top vulnerability reported to a bug bounty program?
Misconfiguration
Cross-site scripting (XSS)
Sensitive information disclosure
Business logic errors
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: According to 8th edition of Hacker-Powered Security Report 2024-25, HackerOne has seen a 67% increase in pentesting over the past year.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to 8th edition of Hacker-Powered Security Report 2024-25, what is the average number of researchers on a high-impact program?
34
9
56
171
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to Jasmin Landry, Security Researcher and HackerOne Pentester, cited in 8th edition of Hacker-Powered Security Report 2024-25, what is a significant risk posed by AI?
Training-data leaks
Unauthorized AI usage within organizations
The hacking of AI models by external parties
AI introducing more vulnerabilities
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What are some recommendations for running a top-tier security program found in the 8th edition of Hacker-Powered Security Report 2024-25?
What are some recommendations for running a top-tier security program found in the 8th edition of Hacker-Powered Security Report 2024-25?
Offer constructive feedback on reports.
Offer the highest bounties possible.
Clearly communicate expected response times.
Respond to researchers with respect and professionalism.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: The concept of return on mitigation (ROM) was recently introduced by HackerOne.
True
False
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the three key traits of high-impact bug bounty programs according to the 8th edition of Hacker-Powered Security Report 2024-25?
Higher bounties
Smaller, focused communities
Stricter acceptance criteria for researchers
Broader testing scope
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?