C844 ITAS 3040
Emerging Technologies in
Cybersecurity
LATEST FA REVIEW
Q&S
©2024/2025
,1. Which of the following technologies is used to create a secure,
tamper-proof ledger of transactions?
- A) Blockchain
- B) Quantum computing
- C) Artificial intelligence
- D) Cloud computing
- ANS: A) Blockchain
2. Which of the following is a primary benefit of using artificial
intelligence in cybersecurity?
- A) Increased manual intervention
- B) Enhanced threat detection and response
- C) Reduced data storage requirements
- D) Improved physical security
- ANS: B) Enhanced threat detection and response
3. Which of the following best describes the concept of zero trust
architecture?
- A) Trusting all internal network traffic
©2024/2025
, - B) Trusting all external network traffic
- C) Never trusting and always verifying all network traffic
- D) Trusting only encrypted traffic
- ANS: C) Never trusting and always verifying all network
traffic
4. Which of the following is a key feature of quantum
cryptography?
- A) Use of classical encryption algorithms
- B) Use of quantum bits (qubits) for encryption
- C) Reliance on physical security measures
- D) Use of symmetric key encryption
- ANS: B) Use of quantum bits (qubits) for encryption
5. Which of the following is a common application of machine
learning in cybersecurity?
- A) Network cabling
- B) Predictive analytics for threat detection
- C) Data backup
- D) Hardware maintenance
- ANS: B) Predictive analytics for threat detection
©2024/2025
Emerging Technologies in
Cybersecurity
LATEST FA REVIEW
Q&S
©2024/2025
,1. Which of the following technologies is used to create a secure,
tamper-proof ledger of transactions?
- A) Blockchain
- B) Quantum computing
- C) Artificial intelligence
- D) Cloud computing
- ANS: A) Blockchain
2. Which of the following is a primary benefit of using artificial
intelligence in cybersecurity?
- A) Increased manual intervention
- B) Enhanced threat detection and response
- C) Reduced data storage requirements
- D) Improved physical security
- ANS: B) Enhanced threat detection and response
3. Which of the following best describes the concept of zero trust
architecture?
- A) Trusting all internal network traffic
©2024/2025
, - B) Trusting all external network traffic
- C) Never trusting and always verifying all network traffic
- D) Trusting only encrypted traffic
- ANS: C) Never trusting and always verifying all network
traffic
4. Which of the following is a key feature of quantum
cryptography?
- A) Use of classical encryption algorithms
- B) Use of quantum bits (qubits) for encryption
- C) Reliance on physical security measures
- D) Use of symmetric key encryption
- ANS: B) Use of quantum bits (qubits) for encryption
5. Which of the following is a common application of machine
learning in cybersecurity?
- A) Network cabling
- B) Predictive analytics for threat detection
- C) Data backup
- D) Hardware maintenance
- ANS: B) Predictive analytics for threat detection
©2024/2025