1D7X1R Afsc
57 community-sourced questions and answers. Free — no login.
Career Field
combination of the AFSC's 1st and 2nd character.
AFSC
Air Force Specialty Code. Assigns and tracks personnel based on their skills and knowledge.
Alphanumeric code consisting of five characters, describes various AF jobs
AFSC
Career Group
First character of an AFSC.
The Career Group is divided into the following categories:
1. Operations 2. Maintenance & Logistics 3. Support 4. Medical & Dental 5. Legal & Chaplain 6. Finance & Contracting 7. Special Investigations
Career field under the operations category
Cyberspace Defense
Career Field Subdivision
1st thru 3rd characters of the AFSC
Grouping of personnel with related work requirements and qualifications
Career Field Subdivision
Skill Level
4th character in AFSC
This specifies the degree of experience an individual holds
Skill Level
1 - Helper
Received after completion of Basic Military Training (BMT)
3 - Apprentice
Awarded upon completion of formal technical training.
5 - Journeyman
Combination of OJT, task certification, and completing CDC's (Career Development Course)
7 - Craftsman
Accomplished upon acheiving the rank of SSg and completing 12 months of OJT
9 - Superintendent
Identifies AMN who have shown a high degree of managerial and supervisory ability to fill positions requiring broad knowledge. Awarded when promoted to Senior Master Sergeant.
This identifies the specific specialty
5th character of AFSC
1D7X1
Cyber Defense Operations
1D7X2
Specturm Defense Operations
1D7X3
Cable and Antennae Defense Operations
Specialty Shredouts
6th character that identifies positions associated with a particular type of equipment within a single specialty
Cyber Defense Operations shredouts
1D7X1A - Network Operations 1D7X1B - Systems Operations 1D7X1D - Security Operations 1D7X1E - Client Systems Operations 1D7X1K - Knowledge Operations 1D7X1R - RF operations 1D7X1Z - Software Development Operations
WAPS Factors
Specialty Knowledge Test (SKT), Promotion Fitness Examiniation (PFE), Enlisted Performance Report (EPR), Military Decorations and Awards
Specific Knowledge Test (SKT)
Measures specific job information - 100 points
Promotion Fitness Examiniation (PFE)
Measure general military knowledre in a specific grade level - 100 points
Enlisted Performance Report (EPR)
Measures an Airman's past job performance and promotion potential - 250 points
Military Decorations and Awards
Points for earning verious decorations or awards - 25 points
(OJT) On-the-job Training
Training provided to inexperienced employee supervised at the work site.
Learning Programs
Previously know as CDC's. Developed from CFETP containing information on basic principles, techniques and procedures common to a specific AFSC.
(AFJQS) Air Force Job Qualification Standard
Comprehensive task list describing a particular job type or duty position. Used to docuent task qualification.
(AFQTP) Air Force Qualification Training Package
Instructional course desiged for use at the unit to qualify or aid qualification in a duty position, program, or peice of equipment.
Career Field Education and Training Plan (CFETP)
Established the framework for managing the career field education and training. "road map"
Core Compentencies
- Server operating systems - System and user Accounts Services - Contigency Operations - Strategic and Budget Planning - System/Database administration - Project management - Cloud Computing - Network Security
for supporting the identification, reconnaissance and exploitation of vulnerabilities while enhancing capabilities within the cyber environments are what?
1D7X1B responsibilites
System Account Management (SAM)
is standardizing user privileges and system settings
What is a key responsibility of the 1D7X1B career field? How is this accomplished?
implement security policies (system and information safeguards). This is done by maintaining and implementing security fixes, updates, operating system (OS) patches and antivirus software.
What does The Defense Information Systems Agency (DISA) direct?
Information Assurance Vulnerability Assessments (IAVA) corrective efforts to mitigate security weaknesses found in programs and systems.
What are the 4 C's (C4NOTAM) we assist in responding to? Who sends these notices?
Command, Control, Communications, and Computers (C4) AF Network Operations (AFNETOPs) hierarchy 5
Time Compliance Technical Orders (TCTO)
used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).
Classified Message Incidents (CMIs)
caused when classified information was inadvertently placed on unclassified systems.
Combat Information Transport System (CITS) program
to help standardize the network infrastructure (both hardware and software).
Information Warfare Operations supports (under strict and controlled parameters) the development of _________________________ in both defensive and offensive missions on the AF and DoD computer networks.
Test, Tactics, Techniques and Procedures (TTPs)
The purpose of ___________________ is to exploit an enemy's information systems and while defending ours against hostile operations.
information warfare
_______________ manages, supervises, and performs planning and implementation activities for the network.
Strategic Budget Planning
_________________ are the result of the Cyber Squadron Initiative, which is a plan to move communications squadrons away from information Technology (IT) service toward a mission set that involves the cyberspace side of their wing's operational mission.
Mission Defense Teams (MDTs )
_________________ provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.
Directory Services
________________ are those that allow, denies, redirects, and logs traffic traversing base firewalls and proxies. They are also in charge of setting up Access Control Lists (ACLs).
Boundary technicians/shop
_______________ employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace. These teams manage routers, switches, IP addresses, and other things on a networking level.
Infrastructure teams
Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving. These teams will also be in charge of managing SANs that are housing the virtual environment, VMs, or data.
Storage and Virtualization
____________________ denies adversary access to friendly terrain. These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.
Vulnerability Management
Provides situational awareness to all components, systems and network devices, of that which it monitors. These teams do exactly what you'd expect, they proactively monitor/observe the network, servers, and devices for degradation of any kind. This team configures network management applications to receive real-time alerts and provide situation updates to the operator. A technician from _______________ may find themselves working with SolarWinds and Application Manager.
Monitoring
This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication. They also are responsible for the certification and accreditation of the networks.
Information Assurance
This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures.
Standard/Evaluation Team
This team is responsible for the managing daily operations and directions. Any tasking or cyber mission generated from the top that needs to be carried out on the AFIN, will funnel down to the crew operations team. The individuals on the ______________ team, made up of multiple back shops (teams above) carry out and execute those tasked mission(s) on the AFIN.
Crew Operations
________________ is an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system. It addresses security vulnerabilities in people, technology, and operations for the duration of the system's lifecycle. Instead of relying on security provided by a single point of entry, ________________ seeks to make system penetration difficult at every layer of access.
Defense-in-Depth
Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.
Proactive Defense
Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.
Network Standardization
Maintaining proper ________________ assists you in preparing for and recognizing a threat. ________________ is a decision maker's mental model of an evolving situation. Having complete, accurate, and up-to-the-minute ________________ is considered essential for those who are responsible for being in control of complex, dynamic systems and/or high-risk situations.
situational awareness
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials