Career Field Structure and Progression
IT System and Web Fundamentals
AFCYBER Weapons Systems
Network Systems
Network Authentication and Addressing
100

The AF uses ___________ to assign and track personnel based on skills and knowledge obtained.

What is an AFSC?

100

What are the two types of interfaces?

What is GUI and CLI?

100

The Air Force's provision of global reach, power and vigilance across the domains of air and space now applies to the cyberspace of __________ _______ _______?

What is cyberspace weapon systems?

100

What provides a connection between two or more network segments and can connect dissimilar physical topologies(wired or wireless)?

What is a Bridge?

100

What 2 types of IP Addresses are there?

What is IPv4 and IPv6?

200

What is the combination of the ADSC's 1st and 2nd character?

What is a Career Field?

200

What are the 3 Cross Domain Solution(CDS) Functions?

What is transfer, access, and multi-level?

200

What capability has the primary function of Operational-level cyber C2 and situational awareness?

What is Command and Control Mission Systems (C3MS)?

200

A Metropolitan Area Network (MAN) is a network physically covering an area larger than a LAN yet smaller than a Wide Area Network (WAN). What is another type of MAN?

What is a Campus Area Network (CAN)?

200

What Network class ranges from 128-191?

What is Class B?

300

Name AFSC skill levels for 1, 3, 5, 7 and 9?

What is a helper, apprentice, journeyman, craftsman, and superintendent?

300

What's the difference between Syntax and Semantics?

What is Syntax is the symbols, words and characters formed within the language and semantics is the meaning of those characters when arranged in a particular way?

300

Conducting defensive cyber operations to identify and counter advanced persistent threats to critical capabilities is the primary function of what capability?

What is Cyberspace Vulnerability Assessment/Hunter (CVA/H)?

300

What are the 4 factors for selecting transmission media?

What is Distance, Frequency(Bandwidth), Interference and Cost?

300

What is a general term for computer software providing services to software applications beyond those available from the operating systems?

What is Middleware?

400

Name the 4 responsibilities for 1D7X1B.

What is System user and user account services, security, contingency operations and strategic and budget planning?

400

What are the High-level Language types and give an example for each?

What is Interpreted(Java Script) and Compiled(C, C++, Visual basic)?

400

What capability has the primary function of global-level entry?

What is Air Force Intranet Control (AFINC)?

400

What is the difference between a Full Mesh and Partial Mesh Topology?

What is all nodes are connected in Full Mesh and some nodes are connected all nodes, but some nodes are only connected to nodes they need to communicate with?

400

The set of functions necessary for cryptographic operations, such as signing and encrypting email.

What is Cryptographic Services?

500

Name at least 5 of the 9 1D7X1B duties.

What is Mission Defense Teams(MDT), Directory Services, Boundary Protection Team, Infrastructure, Storage and Virtualization, Vulnerability Management, Monitoring, Information Assurance and Stand Eval?

500

Name 4 of the 6 schema types.

What is Flat Model, Hierarchal Model, Network Model, Relational Model, Star Schema and Snowflake Schema?

500

What capability has the primary function of defensive cyberspace operations to prevent, detect and respond to network intrusions?

What is Air Force Cyberspace Defense(ACD)?

500

Name 2 advantages and 2 disadvantages of client server architecture?

What is 

Advantages: 1.easy management and organization of resources 2. Security 

Disadvantages: 1. expensive 2. adding clients reduces speed 3. If the server crashes all data could be lost


500

What do you need to access information on your CAC?

What is a PIN?