Air ForceAnswer Key

1D7 Afsc

46 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

AFSC breakdown

ANSWER

1. Career Group 2. Career Field 3. Subdivision 4. Skill Level 5. Specialty Code 6. Shredout

QUESTION 2

1D7 Specialty Codes

ANSWER

X1 - Cyber X2 - Spectrum X3 - Cable and Antennae

QUESTION 3

1D7X1 Shredouts

ANSWER

A - Net Ops B - Sys Ops D - Sec Ops E - Client Systems K - Knowledge Ops R - RF Ops Z - Software Dev Ops

QUESTION 4

Four WAPS factors

ANSWER

SKT - 100 pts PFE - 100 pts EPR - 250 pts Awards and Decs - 25 pts

QUESTION 5

Skill Level Progression Factors

ANSWER

rank, OJT, CBTs, JQSs, QTPs, LPs (all based off CFETP)

QUESTION 6

1D7X1B Core Competencies

ANSWER

System and User Accts Services - SAM; implement SSLAs/MOUs; DS; DNS; SAN; PKI for email Contingency Ops - T3P development; IW; C4 management Strategic and Budget Planning - project management Network Security - patching, updating, security policies; TCNO (patching); TCTO (sanitization)

QUESTION 7

1D7X1B Duties

ANSWER

MDT - defensive cyber ops DS - auth and access via DRA, AD, domain controllers, DNS, DHCP etc Boundary Prot - ACL management; firewalls; proxies Infra - physical/virt security on AF gateways; routers, switches, IP addresses Storage and Virt - VMs, SANs Vuln Management - scans, patches, STIGs via HBSS, ACAS, SCCM; CSCS Monitoring - continuous monitoring of network systems/devices; Solar Winds/ App Manager IA - ensures CIA, non-repud, authent Stan/Eval Crew Ops - cyber missions

QUESTION 8

Other terms

ANSWER

Defense in Depth Proactive Defense Network Standardization SA

QUESTION 9

What are the two basic components of programming languages?

ANSWER

syntax - grammar semantics - meaning

QUESTION 10

Two types of programming languages

ANSWER

Low-level - machine code High-level - code that requires interpretation or compilation

QUESTION 11

Common Languages

ANSWER

C++ - compiled; object oriented Java - compiled; runs in virt environment Powershell - interpreted; Windows CLI

QUESTION 12

Service Oriented Architecture (SOA)

ANSWER

delegation of services to specific servers in order to increase efficiency, scalability, interoperability, and reusability of those services across a network

QUESTION 13

NoSQL

ANSWER

flexible, efficient, scalable schema database for large volume data; lower data consistency restrictions

QUESTION 14

Database Schema

ANSWER

Flat - 2D; excel Hierarchical - tree Network - nodes w/ branches Relational - multiple tables linked to each other Star - relational evolution; facts (numerical) and dimensions (descriptive) Snowflake - layered star

QUESTION 15

Structured Query Language (SQL)

ANSWER

an international standard language used to organize and retrieve data in relational databases

QUESTION 16

Graphical User Interface (GUI)

ANSWER

lower level of control; visual display; safeguards against erroneous commands

QUESTION 17

Command Line Interface (CLI)

ANSWER

text only; little to no safeguards; more in-depth control

QUESTION 18

Cross-Domain Solution (CDS)

ANSWER

Allows data to go from one security enclave to another enclave of a higher classification

QUESTION 19

CDS functions

ANSWER

Transfer, Access, Multi-Access

QUESTION 20

CDS implementation phases

ANSWER

Phase I - requirements validation Phase II - risk assessment Phase III - engineering review Phase IV - ATO

QUESTION 21

Memory Types

ANSWER

Primary - typically volatile memory tied closely to CPU operations (RAM/ROM) Secondary - removable non-volatile memory (SSD/HDD)

QUESTION 22

RAM types

ANSWER

Static - preloaded instructions; not often rewritten Dynamic - constantly writing/rewriting stored values Non-Volatile - replaced battery powered SRAM

QUESTION 23

EEPROM

ANSWER

CMOS - contains BIOS/UEFI settings

QUESTION 24

Interrupt Request (IRQ)

ANSWER

hardware or software signal sent to stop processing and pay attention to the device or software sending the request

QUESTION 25

Drivers

ANSWER

Software that allows peripherals to communicate with the connected computer

QUESTION 26

Unified Extensible Firmware Interface

ANSWER

successor to BIOS; has a GUI; boots faster; allows for secure boot via a TPM

QUESTION 27

Web services

ANSWER

enables connection between services that makes SOA possible

QUESTION 28

Secure coding practices

ANSWER

No sensitive data in user-viewable source code Disable diagnostic tools before app deployment Keep user-viewed error information succinct

QUESTION 29

Markup Language

ANSWER

Use codes, called tags, to provide instructions about the structure and formatting of a document

QUESTION 30

Types of Markup Languages

ANSWER

HTML - defines structure and layout of data in webpages; can contain Java applets for interactivity XML - focused on data transfer (?); easily extensible (new functions can be easily written and added into the code) CSS/XSLT - defines visual layout of a webpage

QUESTION 31

Sandbox Languages

ANSWER

Run in a virtual environment; ActiveX, Java, Flash, Silverlight

QUESTION 32

Python

ANSWER

object oriented, flexible, easily understood programming language

QUESTION 33

Weapons Systems

ANSWER

CVA/H - Vuln Assessment; counter APTs CDA - monitors voice, radio freqs, email; risk assessment C3MS - SA; data fusion into ISR prods; Cyber taskers AFINC - top-level boundary protection at global entry points ACD - IPS/CIRT/Forensics CSCS - enterprise level ops; DS; Solarwinds; storage and virt; VM

QUESTION 34

Network Terminology

ANSWER

Client - computer or device requesting resources or services from another Host - any device on a network enabling resource sharing by other computers Network Devices - connectivity devices (router, switch, bridges) Node - any device connected to the network w/ a unique address and send or receive capes Server - computer dedicated to specific resources or services Transmission Media Workstation - personal computer (doesn't have to be connected to a network) Thin client - primarily provides access to servers to provide functionality; few to no apps directly installed on device Thick client - majority of apps located on device hard drive; can function w/o network connectivity

QUESTION 35

Network Architectures

ANSWER

Client-Server - clients connect to servers to access other clients, resources and services on the network; star topology; good for organization, management, and security; high cost to maintain P2P - all nodes connected to each other; full mesh topology; no servers; low cost; low security and hard to manage on a large scale

QUESTION 36

Server Types

ANSWER

Application - runs specific apps DHCP - designates and assigns IP addresses to devices DNS - resolves domain names to IP addresses Mail - transfers and stores email data Proxy - middleman device providing forward/reverse filtering, IP masking, caching Virtual - allows for multiple instances of servers on one device Web - provides static web content to web browsers via HTTP

QUESTION 37

Network Types

ANSWER

LAN/WLAN - networks in small geographic areas MAN/CAN - networks spanning larger geographical areas (cities/large campuses) WAN - networks spanning even larger geographic areas (states/countries) GAN - networks spanning the globe PAN/WPAN - connections designed for the area around a single user

QUESTION 38

Network Topologies

ANSWER

Star - basic client-server; one central node to many devices Tree - hierarchical; many clients to one server; many servers to one parent server; many parent servers to one root server Mesh - all nodes have connections to most or all other nodes (IoT devices); full mesh and partial mesh Hybrid - any combination of the above topologies

QUESTION 39

Transmission Media

ANSWER

Bounded - wired Unbounded - wireless Cables - copper (UTP/STP); fiber (single/multi mode) Wireless - radio wave; infrared

QUESTION 40

What are some criteria to consider when selecting the transmission media to use for a network?

ANSWER

distance between devices; frequency of wireless communications; interference potential; cost

QUESTION 41

Network Devices

ANSWER

NIC - allows a computer to connect to a network Switch - evolution of a hub; determines data traffic paths for connected devices Bridges - connect dissimilar network topologies Routers - connect dissimilar network types Repeater - denoises a signal and repeats it to extend the range of the signal Gateway - used to connect devices using dissimilar protocols or architectures

QUESTION 42

What three credential types are provided by AF PKIs?

ANSWER

ID Cert, e-mail encryption, digital signature

QUESTION 43

Two types of encryption

ANSWER

symmetric - one shared secret key between users; fast encryption/decryption; lower security asymmetric - private and public keys for each user; slower encryption/decryption; higher security

QUESTION 44

PKI Infra

ANSWER

Root CA - root of trust; certifies subordinate CAs for cert issuance Sub CA - issues certs RA - processes CSRs for the CA Cert Database - contains issued certs and pending or rejected requests Cert Store - contains issued certs and pending or rejected requests Key Archival Server - contains private keys for disaster recovery

QUESTION 45

Multi-Factor Authentication Types

ANSWER

Something you know - most common; cheap; low security Something you are - static biometrics; costly; high security Something you have - tokens/token generators Somewhere you are - location data required Something you do - dynamic biometrics; costly; high security

QUESTION 46

Network Addressing

ANSWER

TCP/IP - most widely used combination of protocols for networking TCP - connection oriented protocol IP - contains data's source and destination address Network Address - designation used in routing to ID source and destination networks IP address - logical address to ID a single host/device on a network Broadcast address - address used to send info to all hosts on a network

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials