Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Professional Development

10 Qs

quiz-placeholder

Similar activities

Forcepoint - Corporate 2 Division

Forcepoint - Corporate 2 Division

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - IT Certifications

IT ENGLISH: Research Project Topics - IT Certifications

Professional Development

10 Qs

Microsoft 365 Copilot

Microsoft 365 Copilot

Professional Development

10 Qs

Hacker Academy Basic Training Quiz

Hacker Academy Basic Training Quiz

Professional Development

15 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

Security vs. Safety

Security vs. Safety

Professional Development

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Tanya Aisley

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the top vulnerability reported to a bug bounty program?

  1. Misconfiguration

  1. Cross-site scripting (XSS)

  1. Sensitive information disclosure

  1. Business logic errors

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: According to 8th edition of Hacker-Powered Security Report 2024-25, HackerOne has seen a 67% increase in pentesting over the past year.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the average number of researchers on a high-impact program?

  1. 34

  1. 9

  1. 56

  1. 171

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Jasmin Landry, Security Researcher and HackerOne Pentester, cited in 8th edition of Hacker-Powered Security Report 2024-25, what is a significant risk posed by AI?

  1. Training-data leaks

  1. Unauthorized AI usage within organizations

  1. The hacking of AI models by external parties

  1. AI introducing more vulnerabilities

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

  1.  What are some recommendations for running a top-tier security program found in the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Offer constructive feedback on reports.

  1. Offer the highest bounties possible.

  1. Clearly communicate expected response times.

  1. Respond to researchers with respect and professionalism.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: The concept of return on mitigation (ROM) was recently introduced by HackerOne.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three key traits of high-impact bug bounty programs according to the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Higher bounties

  1. Smaller, focused communities

  1. Stricter acceptance criteria for researchers

  1. Broader testing scope

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?