Cybersecurity Threats and AI Defense (CY0-001) Flashcards
CompTIA SecAI+ CY0-001 Flashcards

| Front | Back |
| Advanced Persistent Threats (APTs) | AI analyzes long-term attack patterns to counteract targeted intrusions |
| API abuse | AI monitors API call patterns to identify and mitigate exploitation attempts |
| Botnet activities | AI tracks IP reputation and detects botnet command-and-control signals |
| Browser hijacking | AI monitors and prevents unauthorized changes to browser configurations |
| Brute force attacks | AI detects repeated login attempts and implements adaptive security measures |
| Cloud security threats | AI provides continuous monitoring for unauthorized access and misconfigurations |
| Command injection | AI scans for system command anomalies that could signal injection attacks |
| Credential stuffing | AI identifies high-volume login attempts to block automated attacks |
| Critical infrastructure attacks | AI monitors SCADA systems for irregular control commands or activities |
| Cross-site scripting (XSS) | AI detects suspicious code or scripts embedded in web pages |
| Cryptojacking | AI detects unauthorized resource usage tied to cryptocurrency mining |
| Dark web threats | AI analyzes dark web forums for leaked credentials or upcoming attack plans |
| Data exfiltration | AI uses network monitoring tools to detect unauthorized data transfers |
| Digital supply chain spoofing | AI identifies forged digital certificates and suspicious software updates |
| Distributed Denial of Service (DDoS) | AI identifies and mitigates abnormal traffic patterns in real-time |
| DNS tunneling | AI analyzes DNS request patterns to uncover covert data channels |
| Drive-by downloads | AI flags compromised websites and blocks unauthorized file downloads |
| Email spoofing threats | AI examines header authenticity and sender reputation metrics |
| Endpoint device cloning | AI flags duplicate device signatures indicating potential security compromises |
| Endpoint protection | AI secures endpoints by detecting malicious activity and behavioral anomalies |
| Fake or deepfake media | AI detects manipulated media using facial and audio analysis techniques |
| Fileless malware | AI detects memory-based attacks using anomaly detection techniques |
| Firmware hacking | AI monitors firmware-level behaviors for signs of malicious tampering |
| Insider threats | AI analyzes user activity to flag anomalies that may indicate a malicious insider |
| IoT device vulnerabilities | AI secures IoT devices by identifying abnormal device behaviors |
| Malware detection | AI uses behavioral analysis and machine learning to identify malicious code |
| Man-in-the-Middle (MitM) attacks | AI encrypts communication channels and monitors for interception attempts |
| Mobile device threats | AI scans apps and network activity for malicious behaviors on mobile platforms |
| Phishing attacks | AI tools analyze email metadata and content to detect phishing attempts |
| Privilege escalation attempts | AI traces user behavior to prevent unauthorized access elevation |
| Ransomware threats | AI monitors abnormal file encryption patterns to identify ransomware actions |
| Remote code execution (RCE) | AI tracks suspicious processes to block unauthorized code execution attempts |
| Rogue access points | AI identifies unauthorized network access points and secures wireless connections |
| Social engineering attacks | AI assesses communication patterns to flag potential deception or manipulation |
| SQL injection | AI scans for unusual database query behaviors to prevent data breaches |
| Steganography | AI scans media files for hidden malicious code or secret communication channels |
| Supply chain attacks | AI monitors vendor and partner interactions for suspicious activities |
| Threat hunting | AI automates data analysis to identify potential attacks proactively |
| Wireless eavesdropping | AI encrypts wireless signals and flags attempts to intercept communications |
| Zero-day vulnerabilities | AI predicts and patches vulnerabilities based on threat intelligence data |
About the Flashcards
Flashcards for the CompTIA SecAI+ exam provide a quick way to master how artificial intelligence strengthens cybersecurity defenses against today's most common attacks. Each card condenses definitions and real-world examples, letting you recall how AI spots phishing emails, halts ransomware encryption, or predicts zero-day exploits.
The deck moves methodically from network and cloud threats to web application vulnerabilities, endpoint and mobile risks, and advanced persistent threats. It also reinforces critical ideas such as privilege escalation, data exfiltration, and botnet command-and-control analysis. Reviewing these terms helps you recognize attack signatures, mitigation strategies, and security monitoring concepts that frequently appear on the exam.
Topics covered in this flashcard deck:
- AI-driven threat detection
- Network and cloud attacks
- Malware and ransomware
- Web application exploits
- Social engineering defenses
- Insider and APT threats