NSCT – Emerging Trends in Cyber Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Emerging trends in cyber security focus on: (A) Deleting old files (B) New technologies, threats, and strategies to protect information systems (C) Compressing data (D) Increasing CPU speedShow All Answers 2. . Artificial Intelligence (AI) in cybersecurity is used to: (A) Compress logs (B) Delete malware automatically (C) Detect and respond to threats faster using machine learning (D) Increase network speed only 3. . Blockchain technology enhances cybersecurity by: (A) Providing secure, tamper-proof transactions and data integrity (B) Compressing files automatically (C) Deleting old transactions (D) Increasing bandwidth 4. . Cloud security trends include: (A) Zero trust, AI-based monitoring, and multi-cloud security strategies (B) Deleting cloud files (C) Compressing storage (D) Increasing download speed only 5. . Zero Trust Architecture means: (A) Compress network traffic (B) Trust all devices by default (C) Encrypt files automatically (D) Never trust, always verify every user and device 6. . Internet of Things (IoT) security is important because: (A) IoT devices are often vulnerable to attacks (B) IoT devices are immune to threats (C) Compressing IoT data prevents attacks (D) Deleting IoT logs ensures security 7. . Quantum computing affects cybersecurity by: (A) Compressing files (B) Potentially breaking current encryption algorithms (C) Deleting malware automatically (D) Increasing bandwidth 8. . Advanced Persistent Threats (APTs) are: (A) Simple viruses (B) Sophisticated, long-term cyber attacks targeting specific organizations (C) Compressed logs (D) Deleted files automatically 9. . Threat intelligence platforms (TIPs) help in: (A) Increasing CPU speed (B) Deleting old files (C) Compressing logs (D) Collecting and analyzing cyber threat information for proactive defense 10. . Ransomware attacks are an emerging cybersecurity challenge because: (A) They delete malware (B) They compress files (C) They encrypt user data and demand payment to restore access (D) They improve network speed 11. . Endpoint security trends include: (A) Deleting endpoint files automatically (B) AI-based malware detection, endpoint detection and response (EDR) (C) Compressing endpoints (D) Increasing endpoint speed only 12. . Security automation and orchestration help to: (A) Reduce manual intervention and speed up incident response (B) Compress data automatically (C) Delete old logs (D) Increase CPU speed only 13. . Threat hunting involves: (A) Encrypting files automatically (B) Proactively searching for hidden threats before they cause damage (C) Deleting malware (D) Compressing logs 14. . 5G networks require new cybersecurity measures because: (A) They increase network speed but also expand attack surfaces (B) They delete malware automatically (C) They compress data automatically (D) They remove threats automatically 15. . Biometric security trends include: (A) Fingerprint, facial recognition, and behavioral biometrics for authentication (B) Using passwords only (C) Deleting biometric data (D) Compressing authentication logs 16. . Security in Artificial Intelligence systems is emerging because: (A) AI always encrypts data automatically (B) AI cannot be attacked (C) AI systems can be manipulated or attacked if not properly secured (D) AI compresses logs 17. . Cybersecurity mesh architecture (CSMA) is: (A) Increasing CPU speed (B) Compressing network data (C) Deleting old firewalls (D) A flexible, modular approach to security where each system enforces its own security 18. . Privacy-enhancing technologies (PETs) include: (A) Compressing logs (B) Deleting old data (C) Encryption, anonymization, and differential privacy techniques (D) Increasing system speed 19. . Cybersecurity awareness and training are emerging trends because: (A) Training deletes malware (B) Human error remains one of the biggest security risks (C) Awareness compresses files (D) Speed increases automatically 20. . The main goal of emerging trends in cyber security is to: (A) Compress data (B) Adapt to new threats, technologies, and strategies to protect digital assets effectively (C) Delete old files (D) Increase system speed only