Test Your Skills
Multiple-Choice Questions
1. Which of the following is NOT a primary goal in the framework for external attack surface discovery and exploitation?
Discover
Monitor
Actionable insights
Patch management
2. What is the purpose of the Common Vulnerability Scoring System (CVSS)?
To predict the likelihood of a vulnerability being exploited
To communicate the characteristics and severity of software vulnerabilities
To list vulnerabilities that have been exploited in the wild
To generate exploit code for known vulnerabilities
3. What does EPSS stand for in the context of vulnerability assessment?
Exploit Prediction Scoring System
External Penetration Security System
Enhanced Protection Scanning Service
Exploit Prevention Scoring Standard
4. Which organization maintains the Known Exploited Vulnerabilities (KEV) Catalog?
NIST
OWASP
CISA
ISO
5. What is the primary purpose of the ProjectDiscovery Nuclei Scanner?
To generate AI models for vulnerability detection
To create vulnerability reports
To identify and mitigate security vulnerabilities across various platforms
To manage bug bounty programs
6. What type of file format does Nuclei use for its templates?
STIX
XML
YAML
TXT
7. What is LoRA in the context of AI model fine-tuning?
Low-range analysis
Low-rank adaptation
Linear optimization for rapid advancement
Logarithmic rational approximation
8. What does RAG stand for in the context of AI and bug bounty hunting?
Rapid attack generation
Retrieval-augmented generation
Risk assessment guide
Responsive AI governance
9. What is a potential challenge of using AI models with strong guardrails in bug bounty hunting?
Increased accuracy in vulnerability detection
Faster processing of large datasets
Limited ability to generate potentially malicious payloads for testing
Improved compliance with bug bounty program guidelines
10. What is a confabulation in the context of AI-assisted bug bounty hunting?
A visual glitch in the AI interface
A sudden increase in processing speed
Generation of factually incorrect or made-up information
A temporary loss of connection to the AI service
11. Which of the following is NOT a metric group in the Common Vulnerability Scoring System (CVSS) version 4.x?
Base
Threat
Environmental
Exploitation
12. What is the primary advantage of using QLoRA over traditional LoRA?
It allows for fine-tuning of larger models on limited hardware.
It increases the number of trainable parameters.
It eliminates the need for GPU acceleration.
It provides more accurate results in all scenarios.
13. What is the primary purpose of tool calling in AI agents for bug bounty hunting?
To generate more accurate vulnerability reports
To enable the AI to perform tasks using external tools
To improve the AI’s natural language processing capabilities
To create new exploits automatically using an IDE
14. What is the purpose of gradient accumulation in the context of AI model fine-tuning?
To increase the learning rate
To reduce memory constraints
To improve model accuracy
To speed up the training process
