1D7X1K
Question: Career Field
Answer: combination of the AFSC’s 1st and 2nd character.
==================================================
Question: AFSC
Answer: Air Force Specialty Code.
Assigns and tracks personnel based on their skills and knowledge.
==================================================
Question: Alphanumeric code consisting of five characters, describes various AF jobs
Answer: AFSC
==================================================
Question: Career Group
Answer: First character of an AFSC.
==================================================
Question: The Career Group is divided into the following categories:
Answer: 1. Operations
2. Maintenance & Logistics
3. Support
4. Medical & Dental
5. Legal & Chaplain
6. Finance & Contracting
7. Special Investigations
==================================================
Question: Career field under the operations category
Answer: Cyberspace Defense
==================================================
Question: Career Field Subdivision
Answer: 1st thru 3rd characters of the AFSC
==================================================
Question: Grouping of personnel with related work requirements and qualifications
Answer: Career Field Subdivision
==================================================
Question: Skill Level
Answer: 4th character in AFSC
==================================================
Question: This specifies the degree of experience an individual holds
Answer: Skill Level
==================================================
Question: 1 - Helper
Answer: Received after completion of Basic Military Training (BMT)
==================================================
Question: 3 - Apprentice
Answer: Awarded upon completion of formal technical training.
==================================================
Question: 5 - Journeyman
Answer: Combination of OJT, task certification, and completing CDC’s (Career Development Course)
==================================================
Question: 7 - Craftsman
Answer: Accomplished upon acheiving the rank of SSg and completing 12 months of OJT
==================================================
Question: 9 - Superintendent
Answer: Identifies AMN who have shown a high degree of managerial and supervisory ability to fill positions requiring broad knowledge.
Awarded when promoted to Senior Master Sergeant.
==================================================
Question: This identifies the specific specialty
Answer: 5th character of AFSC
==================================================
Question: 1D7X1
Answer: Cyber Defense Operations
==================================================
Question: 1D7X2
Answer: Specturm Defense Operations
==================================================
Question: 1D7X3
Answer: Cable and Antennae Defense Operations
==================================================
Question: Specialty Shredouts
Answer: 6th character that identifies positions associated with a particular type of equipment within a single specialty
==================================================
Question: Cyber Defense Operations shredouts
Answer: 1D7X1A - Network Operations
1D7X1B - Systems Operations
1D7X1D - Security Operations
1D7X1E - Client Systems Operations
1D7X1K - Knowledge Operations
1D7X1R - RF operations
1D7X1Z - Software Development Operations
==================================================
Question: WAPS Factors
Answer: Specialty Knowledge Test (SKT), Promotion Fitness Examiniation (PFE), Enlisted Performance Report (EPR), Military Decorations and Awards
==================================================
Question: Specific Knowledge Test (SKT)
Answer: Measures specific job information - 100 points
==================================================
Question: Promotion Fitness Examiniation (PFE)
Answer: Measure general military knowledre in a specific grade level - 100 points
==================================================
Question: Enlisted Performance Report (EPR)
Answer: Measures an Airman’s past job performance and promotion potential - 250 points
==================================================
Question: Military Decorations and Awards
Answer: Points for earning verious decorations or awards - 25 points
==================================================
Question: (OJT) On-the-job Training
Answer: Training provided to inexperienced employee supervised at the work site.
==================================================
Question: Learning Programs
Answer: Previously know as CDC’s. Developed from CFETP containing information on basic principles, techniques and procedures common to a specific AFSC.
==================================================
Question: (AFJQS) Air Force Job Qualification Standard
Answer: Comprehensive task list describing a particular job type or duty position. Used to docuent task qualification.
==================================================
Question: (AFQTP) Air Force Qualification Training Package
Answer: Instructional course desiged for use at the unit to qualify or aid qualification in a duty position, program, or peice of equipment.
==================================================
Question: Career Field Education and Training Plan (CFETP)
Answer: Established the framework for managing the career field education and training.
“road map”
==================================================
Question: Core Compentencies
Answer: - Server operating systems
System and user Accounts Services
- Contigency Operations
- Strategic and Budget Planning
- System/Database administration
- Project management
- Cloud Computing
- Network Security
==================================================
Question: for supporting the identification, reconnaissance and exploitation of vulnerabilities while enhancing capabilities within the cyber environments are what?
Answer: 1D7X1B responsibilites
==================================================
Question: System Account Management (SAM)
Answer: is standardizing user privileges and system settings
==================================================
Question: What is a key responsibility of the 1D7X1B career field?
How is this accomplished?
Answer: implement security policies (system and information safeguards).
This is done by maintaining and implementing security fixes, updates, operating system (OS) patches and antivirus software.
==================================================
Question: What does The Defense Information Systems Agency (DISA) direct?
Answer: Information Assurance Vulnerability Assessments (IAVA) corrective efforts to mitigate security weaknesses found in programs and systems.
==================================================
Question: What are the 4 C’s (C4NOTAM) we assist in responding to?
Who sends these notices?
Answer: Command, Control, Communications, and Computers (C4)
AF Network Operations (AFNETOPs) hierarchy 5
==================================================
Question: Time Compliance Technical Orders (TCTO)
Answer: used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).
==================================================
Question: Classified Message Incidents (CMIs)
Answer: caused when classified information was inadvertently placed on unclassified systems.
==================================================
Question: Combat Information Transport System (CITS) program
Answer: to help standardize the network infrastructure (both hardware and software).
==================================================
Question: Information Warfare Operations supports (under strict and controlled parameters) the development of _________________________ in both defensive and offensive missions on the AF and DoD computer networks.
Answer: Test, Tactics, Techniques and Procedures (TTPs)
==================================================
Question: The purpose of ___________________ is to exploit an enemy’s information systems and while defending ours against hostile operations.
Answer: information warfare
==================================================
Question: _______________ manages, supervises, and performs planning and implementation activities for the network.
Answer: Strategic Budget Planning
==================================================
Question: _________________ are the result of the Cyber Squadron Initiative, which is a plan to move communications squadrons away from information Technology (IT) service toward a mission set that involves the cyberspace side of their wing’s operational mission.
Answer: Mission Defense Teams (MDTs )
==================================================
Question: _________________ provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.
Answer: Directory Services
==================================================
Question: ________________ are those that allow, denies, redirects, and logs traffic traversing base firewalls and proxies. They are also in charge of setting up Access Control Lists (ACLs).
Answer: Boundary technicians/shop
==================================================
Question: _______________ employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace. These teams manage routers, switches, IP addresses, and other things on a networking level.
Answer: Infrastructure teams
==================================================
Question: Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving. These teams will also be in charge of managing SANs that are housing the virtual environment, VMs, or data.
Answer: Storage and Virtualization
==================================================
Question: ____________________ denies adversary access to friendly terrain. These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.
Answer: Vulnerability Management
==================================================
Question: Provides situational awareness to all components, systems and network devices, of that which it monitors. These teams do exactly what you’d expect, they proactively monitor/observe the network, servers, and devices for degradation of any kind. This team configures network management applications to receive real-time alerts and provide situation updates to the operator. A technician from _______________ may find themselves working with SolarWinds and Application Manager.
Answer: Monitoring
==================================================
Question: This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication. They also are responsible for the certification and accreditation of the networks.
Answer: Information Assurance
==================================================
Question: This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures.
Answer: Standard/Evaluation Team
==================================================
Question: This team is responsible for the managing daily operations and directions. Any tasking or cyber mission generated from the top that needs to be carried out on the AFIN, will funnel down to the crew operations team. The individuals on the ______________ team, made up of multiple back shops (teams above) carry out and execute those tasked mission(s) on the AFIN.
Answer: Crew Operations
==================================================
Question: ________________ is an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system. It addresses security vulnerabilities in people, technology, and operations for the duration of the system’s lifecycle. Instead of relying on security provided by a single point of entry, ________________ seeks to make system penetration difficult at every layer of access.
Answer: Defense-in-Depth
==================================================
Question: Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.
Answer: Proactive Defense
==================================================
Question: Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.
Answer: Network Standardization
==================================================
Question: Maintaining proper ________________ assists you in preparing for and recognizing a threat. ________________ is a decision maker’s mental model of an evolving situation. Having complete, accurate, and up-to-the-minute ________________ is considered essential for those who are responsible for being in control of complex, dynamic systems and/or high-risk situations.
Answer: situational awareness
==================================================