Air ForceAnswer Key

1D7X1R Afsc

57 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Career Field

ANSWER

combination of the AFSC's 1st and 2nd character.

QUESTION 2

AFSC

ANSWER

Air Force Specialty Code. Assigns and tracks personnel based on their skills and knowledge.

QUESTION 3

Alphanumeric code consisting of five characters, describes various AF jobs

ANSWER

AFSC

QUESTION 4

Career Group

ANSWER

First character of an AFSC.

QUESTION 5

The Career Group is divided into the following categories:

ANSWER

1. Operations 2. Maintenance & Logistics 3. Support 4. Medical & Dental 5. Legal & Chaplain 6. Finance & Contracting 7. Special Investigations

QUESTION 6

Career field under the operations category

ANSWER

Cyberspace Defense

QUESTION 7

Career Field Subdivision

ANSWER

1st thru 3rd characters of the AFSC

QUESTION 8

Grouping of personnel with related work requirements and qualifications

ANSWER

Career Field Subdivision

QUESTION 9

Skill Level

ANSWER

4th character in AFSC

QUESTION 10

This specifies the degree of experience an individual holds

ANSWER

Skill Level

QUESTION 11

1 - Helper

ANSWER

Received after completion of Basic Military Training (BMT)

QUESTION 12

3 - Apprentice

ANSWER

Awarded upon completion of formal technical training.

QUESTION 13

5 - Journeyman

ANSWER

Combination of OJT, task certification, and completing CDC's (Career Development Course)

QUESTION 14

7 - Craftsman

ANSWER

Accomplished upon acheiving the rank of SSg and completing 12 months of OJT

QUESTION 15

9 - Superintendent

ANSWER

Identifies AMN who have shown a high degree of managerial and supervisory ability to fill positions requiring broad knowledge. Awarded when promoted to Senior Master Sergeant.

QUESTION 16

This identifies the specific specialty

ANSWER

5th character of AFSC

QUESTION 17

1D7X1

ANSWER

Cyber Defense Operations

QUESTION 18

1D7X2

ANSWER

Specturm Defense Operations

QUESTION 19

1D7X3

ANSWER

Cable and Antennae Defense Operations

QUESTION 20

Specialty Shredouts

ANSWER

6th character that identifies positions associated with a particular type of equipment within a single specialty

QUESTION 21

Cyber Defense Operations shredouts

ANSWER

1D7X1A - Network Operations 1D7X1B - Systems Operations 1D7X1D - Security Operations 1D7X1E - Client Systems Operations 1D7X1K - Knowledge Operations 1D7X1R - RF operations 1D7X1Z - Software Development Operations

QUESTION 22

WAPS Factors

ANSWER

Specialty Knowledge Test (SKT), Promotion Fitness Examiniation (PFE), Enlisted Performance Report (EPR), Military Decorations and Awards

QUESTION 23

Specific Knowledge Test (SKT)

ANSWER

Measures specific job information - 100 points

QUESTION 24

Promotion Fitness Examiniation (PFE)

ANSWER

Measure general military knowledre in a specific grade level - 100 points

QUESTION 25

Enlisted Performance Report (EPR)

ANSWER

Measures an Airman's past job performance and promotion potential - 250 points

QUESTION 26

Military Decorations and Awards

ANSWER

Points for earning verious decorations or awards - 25 points

QUESTION 27

(OJT) On-the-job Training

ANSWER

Training provided to inexperienced employee supervised at the work site.

QUESTION 28

Learning Programs

ANSWER

Previously know as CDC's. Developed from CFETP containing information on basic principles, techniques and procedures common to a specific AFSC.

QUESTION 29

(AFJQS) Air Force Job Qualification Standard

ANSWER

Comprehensive task list describing a particular job type or duty position. Used to docuent task qualification.

QUESTION 30

(AFQTP) Air Force Qualification Training Package

ANSWER

Instructional course desiged for use at the unit to qualify or aid qualification in a duty position, program, or peice of equipment.

QUESTION 31

Career Field Education and Training Plan (CFETP)

ANSWER

Established the framework for managing the career field education and training. "road map"

QUESTION 32

Core Compentencies

ANSWER

- Server operating systems - System and user Accounts Services - Contigency Operations - Strategic and Budget Planning - System/Database administration - Project management - Cloud Computing - Network Security

QUESTION 33

for supporting the identification, reconnaissance and exploitation of vulnerabilities while enhancing capabilities within the cyber environments are what?

ANSWER

1D7X1B responsibilites

QUESTION 34

System Account Management (SAM)

ANSWER

is standardizing user privileges and system settings

QUESTION 35

What is a key responsibility of the 1D7X1B career field? How is this accomplished?

ANSWER

implement security policies (system and information safeguards). This is done by maintaining and implementing security fixes, updates, operating system (OS) patches and antivirus software.

QUESTION 36

What does The Defense Information Systems Agency (DISA) direct?

ANSWER

Information Assurance Vulnerability Assessments (IAVA) corrective efforts to mitigate security weaknesses found in programs and systems.

QUESTION 37

What are the 4 C's (C4NOTAM) we assist in responding to? Who sends these notices?

ANSWER

Command, Control, Communications, and Computers (C4) AF Network Operations (AFNETOPs) hierarchy 5

QUESTION 38

Time Compliance Technical Orders (TCTO)

ANSWER

used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).

QUESTION 39

Classified Message Incidents (CMIs)

ANSWER

caused when classified information was inadvertently placed on unclassified systems.

QUESTION 40

Combat Information Transport System (CITS) program

ANSWER

to help standardize the network infrastructure (both hardware and software).

QUESTION 41

Information Warfare Operations supports (under strict and controlled parameters) the development of _________________________ in both defensive and offensive missions on the AF and DoD computer networks.

ANSWER

Test, Tactics, Techniques and Procedures (TTPs)

QUESTION 42

The purpose of ___________________ is to exploit an enemy's information systems and while defending ours against hostile operations.

ANSWER

information warfare

QUESTION 43

_______________ manages, supervises, and performs planning and implementation activities for the network.

ANSWER

Strategic Budget Planning

QUESTION 44

_________________ are the result of the Cyber Squadron Initiative, which is a plan to move communications squadrons away from information Technology (IT) service toward a mission set that involves the cyberspace side of their wing's operational mission.

ANSWER

Mission Defense Teams (MDTs )

QUESTION 45

_________________ provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.

ANSWER

Directory Services

QUESTION 46

________________ are those that allow, denies, redirects, and logs traffic traversing base firewalls and proxies. They are also in charge of setting up Access Control Lists (ACLs).

ANSWER

Boundary technicians/shop

QUESTION 47

_______________ employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace. These teams manage routers, switches, IP addresses, and other things on a networking level.

ANSWER

Infrastructure teams

QUESTION 48

Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving. These teams will also be in charge of managing SANs that are housing the virtual environment, VMs, or data.

ANSWER

Storage and Virtualization

QUESTION 49

____________________ denies adversary access to friendly terrain. These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.

ANSWER

Vulnerability Management

QUESTION 50

Provides situational awareness to all components, systems and network devices, of that which it monitors. These teams do exactly what you'd expect, they proactively monitor/observe the network, servers, and devices for degradation of any kind. This team configures network management applications to receive real-time alerts and provide situation updates to the operator. A technician from _______________ may find themselves working with SolarWinds and Application Manager.

ANSWER

Monitoring

QUESTION 51

This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication. They also are responsible for the certification and accreditation of the networks.

ANSWER

Information Assurance

QUESTION 52

This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures.

ANSWER

Standard/Evaluation Team

QUESTION 53

This team is responsible for the managing daily operations and directions. Any tasking or cyber mission generated from the top that needs to be carried out on the AFIN, will funnel down to the crew operations team. The individuals on the ______________ team, made up of multiple back shops (teams above) carry out and execute those tasked mission(s) on the AFIN.

ANSWER

Crew Operations

QUESTION 54

________________ is an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system. It addresses security vulnerabilities in people, technology, and operations for the duration of the system's lifecycle. Instead of relying on security provided by a single point of entry, ________________ seeks to make system penetration difficult at every layer of access.

ANSWER

Defense-in-Depth

QUESTION 55

Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.

ANSWER

Proactive Defense

QUESTION 56

Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.

ANSWER

Network Standardization

QUESTION 57

Maintaining proper ________________ assists you in preparing for and recognizing a threat. ________________ is a decision maker's mental model of an evolving situation. Having complete, accurate, and up-to-the-minute ________________ is considered essential for those who are responsible for being in control of complex, dynamic systems and/or high-risk situations.

ANSWER

situational awareness

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials