1D7 Afsc
46 community-sourced questions and answers. Free — no login.
AFSC breakdown
1. Career Group 2. Career Field 3. Subdivision 4. Skill Level 5. Specialty Code 6. Shredout
1D7 Specialty Codes
X1 - Cyber X2 - Spectrum X3 - Cable and Antennae
1D7X1 Shredouts
A - Net Ops B - Sys Ops D - Sec Ops E - Client Systems K - Knowledge Ops R - RF Ops Z - Software Dev Ops
Four WAPS factors
SKT - 100 pts PFE - 100 pts EPR - 250 pts Awards and Decs - 25 pts
Skill Level Progression Factors
rank, OJT, CBTs, JQSs, QTPs, LPs (all based off CFETP)
1D7X1B Core Competencies
System and User Accts Services - SAM; implement SSLAs/MOUs; DS; DNS; SAN; PKI for email Contingency Ops - T3P development; IW; C4 management Strategic and Budget Planning - project management Network Security - patching, updating, security policies; TCNO (patching); TCTO (sanitization)
1D7X1B Duties
MDT - defensive cyber ops DS - auth and access via DRA, AD, domain controllers, DNS, DHCP etc Boundary Prot - ACL management; firewalls; proxies Infra - physical/virt security on AF gateways; routers, switches, IP addresses Storage and Virt - VMs, SANs Vuln Management - scans, patches, STIGs via HBSS, ACAS, SCCM; CSCS Monitoring - continuous monitoring of network systems/devices; Solar Winds/ App Manager IA - ensures CIA, non-repud, authent Stan/Eval Crew Ops - cyber missions
Other terms
Defense in Depth Proactive Defense Network Standardization SA
What are the two basic components of programming languages?
syntax - grammar semantics - meaning
Two types of programming languages
Low-level - machine code High-level - code that requires interpretation or compilation
Common Languages
C++ - compiled; object oriented Java - compiled; runs in virt environment Powershell - interpreted; Windows CLI
Service Oriented Architecture (SOA)
delegation of services to specific servers in order to increase efficiency, scalability, interoperability, and reusability of those services across a network
NoSQL
flexible, efficient, scalable schema database for large volume data; lower data consistency restrictions
Database Schema
Flat - 2D; excel Hierarchical - tree Network - nodes w/ branches Relational - multiple tables linked to each other Star - relational evolution; facts (numerical) and dimensions (descriptive) Snowflake - layered star
Structured Query Language (SQL)
an international standard language used to organize and retrieve data in relational databases
Graphical User Interface (GUI)
lower level of control; visual display; safeguards against erroneous commands
Command Line Interface (CLI)
text only; little to no safeguards; more in-depth control
Cross-Domain Solution (CDS)
Allows data to go from one security enclave to another enclave of a higher classification
CDS functions
Transfer, Access, Multi-Access
CDS implementation phases
Phase I - requirements validation Phase II - risk assessment Phase III - engineering review Phase IV - ATO
Memory Types
Primary - typically volatile memory tied closely to CPU operations (RAM/ROM) Secondary - removable non-volatile memory (SSD/HDD)
RAM types
Static - preloaded instructions; not often rewritten Dynamic - constantly writing/rewriting stored values Non-Volatile - replaced battery powered SRAM
EEPROM
CMOS - contains BIOS/UEFI settings
Interrupt Request (IRQ)
hardware or software signal sent to stop processing and pay attention to the device or software sending the request
Drivers
Software that allows peripherals to communicate with the connected computer
Unified Extensible Firmware Interface
successor to BIOS; has a GUI; boots faster; allows for secure boot via a TPM
Web services
enables connection between services that makes SOA possible
Secure coding practices
No sensitive data in user-viewable source code Disable diagnostic tools before app deployment Keep user-viewed error information succinct
Markup Language
Use codes, called tags, to provide instructions about the structure and formatting of a document
Types of Markup Languages
HTML - defines structure and layout of data in webpages; can contain Java applets for interactivity XML - focused on data transfer (?); easily extensible (new functions can be easily written and added into the code) CSS/XSLT - defines visual layout of a webpage
Sandbox Languages
Run in a virtual environment; ActiveX, Java, Flash, Silverlight
Python
object oriented, flexible, easily understood programming language
Weapons Systems
CVA/H - Vuln Assessment; counter APTs CDA - monitors voice, radio freqs, email; risk assessment C3MS - SA; data fusion into ISR prods; Cyber taskers AFINC - top-level boundary protection at global entry points ACD - IPS/CIRT/Forensics CSCS - enterprise level ops; DS; Solarwinds; storage and virt; VM
Network Terminology
Client - computer or device requesting resources or services from another Host - any device on a network enabling resource sharing by other computers Network Devices - connectivity devices (router, switch, bridges) Node - any device connected to the network w/ a unique address and send or receive capes Server - computer dedicated to specific resources or services Transmission Media Workstation - personal computer (doesn't have to be connected to a network) Thin client - primarily provides access to servers to provide functionality; few to no apps directly installed on device Thick client - majority of apps located on device hard drive; can function w/o network connectivity
Network Architectures
Client-Server - clients connect to servers to access other clients, resources and services on the network; star topology; good for organization, management, and security; high cost to maintain P2P - all nodes connected to each other; full mesh topology; no servers; low cost; low security and hard to manage on a large scale
Server Types
Application - runs specific apps DHCP - designates and assigns IP addresses to devices DNS - resolves domain names to IP addresses Mail - transfers and stores email data Proxy - middleman device providing forward/reverse filtering, IP masking, caching Virtual - allows for multiple instances of servers on one device Web - provides static web content to web browsers via HTTP
Network Types
LAN/WLAN - networks in small geographic areas MAN/CAN - networks spanning larger geographical areas (cities/large campuses) WAN - networks spanning even larger geographic areas (states/countries) GAN - networks spanning the globe PAN/WPAN - connections designed for the area around a single user
Network Topologies
Star - basic client-server; one central node to many devices Tree - hierarchical; many clients to one server; many servers to one parent server; many parent servers to one root server Mesh - all nodes have connections to most or all other nodes (IoT devices); full mesh and partial mesh Hybrid - any combination of the above topologies
Transmission Media
Bounded - wired Unbounded - wireless Cables - copper (UTP/STP); fiber (single/multi mode) Wireless - radio wave; infrared
What are some criteria to consider when selecting the transmission media to use for a network?
distance between devices; frequency of wireless communications; interference potential; cost
Network Devices
NIC - allows a computer to connect to a network Switch - evolution of a hub; determines data traffic paths for connected devices Bridges - connect dissimilar network topologies Routers - connect dissimilar network types Repeater - denoises a signal and repeats it to extend the range of the signal Gateway - used to connect devices using dissimilar protocols or architectures
What three credential types are provided by AF PKIs?
ID Cert, e-mail encryption, digital signature
Two types of encryption
symmetric - one shared secret key between users; fast encryption/decryption; lower security asymmetric - private and public keys for each user; slower encryption/decryption; higher security
PKI Infra
Root CA - root of trust; certifies subordinate CAs for cert issuance Sub CA - issues certs RA - processes CSRs for the CA Cert Database - contains issued certs and pending or rejected requests Cert Store - contains issued certs and pending or rejected requests Key Archival Server - contains private keys for disaster recovery
Multi-Factor Authentication Types
Something you know - most common; cheap; low security Something you are - static biometrics; costly; high security Something you have - tokens/token generators Somewhere you are - location data required Something you do - dynamic biometrics; costly; high security
Network Addressing
TCP/IP - most widely used combination of protocols for networking TCP - connection oriented protocol IP - contains data's source and destination address Network Address - designation used in routing to ID source and destination networks IP address - logical address to ID a single host/device on a network Broadcast address - address used to send info to all hosts on a network
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials