Search Header Logo

Hacker-Powered Security Report 2024-25

Authored by Tanya Aisley

Computers

Professional Development

Hacker-Powered Security Report 2024-25
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the top vulnerability reported to a bug bounty program?

  1. Misconfiguration

  1. Cross-site scripting (XSS)

  1. Sensitive information disclosure

  1. Business logic errors

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: According to 8th edition of Hacker-Powered Security Report 2024-25, HackerOne has seen a 67% increase in pentesting over the past year.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to 8th edition of Hacker-Powered Security Report 2024-25, what is the average number of researchers on a high-impact program?

  1. 34

  1. 9

  1. 56

  1. 171

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Jasmin Landry, Security Researcher and HackerOne Pentester, cited in 8th edition of Hacker-Powered Security Report 2024-25, what is a significant risk posed by AI?

  1. Training-data leaks

  1. Unauthorized AI usage within organizations

  1. The hacking of AI models by external parties

  1. AI introducing more vulnerabilities

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

  1.  What are some recommendations for running a top-tier security program found in the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Offer constructive feedback on reports.

  1. Offer the highest bounties possible.

  1. Clearly communicate expected response times.

  1. Respond to researchers with respect and professionalism.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: The concept of return on mitigation (ROM) was recently introduced by HackerOne.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three key traits of high-impact bug bounty programs according to the 8th edition of Hacker-Powered Security Report 2024-25?

  1. Higher bounties

  1. Smaller, focused communities

  1. Stricter acceptance criteria for researchers

  1. Broader testing scope

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?