MOD I

studied byStudied by 5 people
5.0(1)
Get a hint
Hint

The Career Group is divided into 7 categories

1 / 204

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

205 Terms

1

The Career Group is divided into 7 categories

1. Operations
2. Maintenance & Logistics
3. Support
4. Medical & Dental
5. Legal & Chaplain
6. Finance & Contracting
7. Special Investigation

New cards
2

Special duty assignment include:

Recruiter, First Sergeant, Military Training Instructors (MTI), and Embassy Duty

New cards
3

CAREER FIELD SUBDIVISION

A grouping of personnel with related work requirements and qualifications. (combination of 1st thru 3rd characters)

New cards
4

7-Skill Level

Craftsman skill level advancement will be accomplished upon achieving the rank of Staff Sergeant. At this time, Airmen will receive Craftsman training and 12 months OJT

New cards
5

9-Skill Level

Airmen are awarded Superintendent when promoted to Senior Master Sergeant.

New cards
6

WAPS

utilized for promotion eligibility an AF system for selecting Airman for rank promotion to Staff Sergeant (E-5) and Technical Sergeant (E-6). It was first implemented in 1969 and is still in use today.

New cards
7

WAPS Factors

Specialty Knowledge Test (SKT)
Promotion Fitness Examination (PFE)
Enlisted Performance Report (EPR)
Military Decorations and Awards

New cards
8

Specialty Knowledge Test (SKT)

Culminates with a 100 question test about individual jobs in the AF. Questions are taken from the Career Development Course (CDC). up to 100 points

New cards
9

Promotion Fitness Examination (PFE)

100 question test about AF general supervisory subjects such as enlisted military history, AF doctrine, Expeditionary Forces, Joint Forces, standards of conduct, legal issues, military customs, courtesies, protocols, leadership, training, education, dress and appearance, etc. The questions are taken from the AF Handbook 1 up to 100 points

New cards
10

Enlisted Performance Report (EPR)

up to 250 points - An evaluation of the performance of an enlisted member both on and off duty. It provides meaningful feedback to individuals on what is expected of them, advice on how well they are meeting those expectations and how to improve those expectations. You may be awarded up to 250 points over a total of your last three eligible reports

New cards
11

Military Decoration and Awards

AF members receive promotion points if they are awarded certain military decorations. The amount of points is based on the type of decoration awarded. up to 25 points

New cards
12

On-The-Job Training (OJT)

Provided to inexperienced employees supervised at the work site during the initial stages of employment.

New cards
13

Computer-Based Training (CBT)

Receiving instructions/knowledge through special training courses hosted on a computer system.

New cards
14

AFSC

is an alphanumeric code consisting of five characters describing the various jobs in the AF. This section is designed to identify each character within your AFSC and its relationship to the AF Mission

New cards
15

The 1st character is called the ___________. It identifies the AFSC in terms of its relationship to the AF Mission

Career Group

New cards
16

CAREER FIELD

The field indicates a functional grouping of personnel requiring basically the same knowledge and skills (combination of the AFSC's 1st and 2nd character)

New cards
17

SKILL LEVEL

Specifies the specific degree of experience an individual must obtains within the particular AFSC (The AFSC's 4th character)

New cards
18

1-Skill Level

Considered a Helper. This was received after the completion of Basic Military Training (BMT).

New cards
19

3-Skill Level

Airmen are awarded Apprentice upon completion of formal technical training

New cards
20

5-Skill Level

Technician . When this certification training is completed each individual will be consider "certified" to perform their job with minimal supervision. (12 Months OJT)

New cards
21

Learning Programs

Previously known as Career Development Course (CDC), are published instruction providing information to satisfy the career knowledge component of OJT. They are developed from references identified in the Career Field Education and Training Plan (CFETP)

New cards
22

Air Force Job Qualification Standard (AFJQS)

Comprehensive task list describing a particular job type or duty position. Supervisors use to document task qualification. The tasks are common to all persons serving in the described duty position.

New cards
23

Air Force Qualification Training Package (AFQTP)

Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment. It may be printed, computer- based or some other audiovisual media

New cards
24

CAREER FIELD EDUCATION AND TRAINING PLAN (CFETP)

A that plan standardizes the AFSC's skill level training requirements and establishes the framework for managing the career field education and training

New cards
25

The 8 core competencies of the 1D7X1B career field include

- Server operating systems
- System and User Accounts Services
- Contingency Operations
- Strategic and Budget Planning
- System/Database administration
- Project management
- Cloud Computing
- Network Security

New cards
26

1D7X1B RESPONSIBILITIES ARE:

System and User Accounts Services
Security
Contingency Operations
Strategic and Budget Planning

New cards
27

1D7X1B RESPONSIBILITIES

Provide core services at operating systems and server application levels Installing, supporting and maintaining servers and computer systems across networks

New cards
28

System and User Accounts Services

Managing system accounts
Group Policy and Remote Management
Account Management
Directory Services
Storage
Email
Secure Authentication
Fault Isolation
Restore Network Services
Manage Network Outages

New cards
29

Implement security policies - Manage Security Weaknesses on Network TCNOs, TCTOs, CTOs, NOTAMs/C4NOTAMs

Security

New cards
30

Vulnerability Management
Patching Systems
Antivirus Updates
Information Assurance Vulnerability Assessment (IAVAs)

Security

New cards
31

Classified Message Incidents (CMIs) response
Sanitize Systems

Security

New cards
32

Combat Information Transport System (CITS)
Standardize Network Infrastructure via COTS equipment
Maintains Compliance

Security

New cards
33

Information Warfare Operations Exploit an enemy's information systems and defend ours Develop Test, Tactics, Techniques and Procedures for missions

Contingency Operations

New cards
34

Operations identify, analyze, exploit adversary's network operations and systems based on rules of engagements (ROEs).

Contingency Operations

New cards
35

Restoral and Contingency operations plans
Develops and implement in case of emergency

Contingency Operations

New cards
36

Command, Control, Communication and Computer (C4) systems. System Lifecycle Management Collect Requirements and Supporting Documentation

Contingency Operations

New cards
37

Strategic and Budget Planning

Planning and Implementation Activities for Networks Equipment/Software purchases Project Installation Project Management Facility Design/Military Construction Planning

New cards
38

Mission Defense Teams

Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.

New cards
39

Directory Services

Provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.

New cards
40

Boundary Protection

The main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.

New cards
41

Infrastructure

Teams employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace.

New cards
42

Storage and Virtualization

Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving

New cards
43

Vulnerability Management

These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.

New cards
44

Monitoring

Provides situational awareness to all components, systems and network devices, of that which it monitors.

New cards
45

Information Assurance

This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication

New cards
46

Standard/Evaluation Team

This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures

New cards
47

Crew Operations

This team is responsible for the managing daily operations and directions.

New cards
48

1D7X1B DUTIES

Mission Defense Teams
Directory Services
Boundary Protection
Infrastructure
Storage and Virtualization
Vulnerability Management
Monitoring
Information Assurance
Standard/Evaluation Team
Crew Operations

New cards
49

Defense in Depth

an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system.

New cards
50

Proactive Defense

Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.

New cards
51

Network Standardization

Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements

New cards
52

Situational Awareness

Maintaining proper ___________ assists you in preparing for and recognizing a threat

New cards
53

PROGRAM

A set of instructions designed and written to perform a specific task within a computer system.

New cards
54

PROGRAMMING LAUNGUAGES

the description, measurement or expression of processes or algorithms and includes digital as well as non-digital data performed by computing machines.

New cards
55

Syntax

The way symbols, words and characters are formed within each programming language

New cards
56

Semantics

The meaning each set of characters convey when arranged in a particular way

New cards
57

There are _____ basic categories of programming languages

Two.
Low-level and High-level

New cards
58

Low-level Languages

This code is easily and readily executed by the computer without any assistance from any other program.

New cards
59

High-level languages

Computer language that is more user-friendly and offer a larger portability across various platforms. They are not limited by the computer hardware

New cards
60

There are ___ primary types of high level languages

Two
Interpreted and Compiled

New cards
61

Interpreted Programming Language

Code is saved in the same format entered and does not need to be compiled before execution

New cards
62

Compiled Programming Languages

Will translate the program directly into machine code specific to the target computer's CPU (This allows programs to generally run faster than interpreted ones)

New cards
63

Service

A function that is well-defined, self-contained and does not depend on the state of
other services. It is the endpoint of a connection.

New cards
64

Service-oriented architecture (SOA)

a design blueprint or framework for applications within an enterprise

New cards
65

Benefits of Service Oriented Architecture

Reusability
Interoperability
Scalability and Flexibility
Cost Efficiency

New cards
66

DATABASE

an organized collection of structured information, or data, typically stored electronically in a computer system.

New cards
67

Flat File Database

___ databases are databases of just one table. It can be created in database software or in a spreadsheet and is often saved as a CSV file (highly compatible between databases and other applications)

New cards
68

Relational Database

A large set of data about many different entities, allow data to be separated and connected across several tables. Tables are connected through primary and foreign keys to increase efficiency

New cards
69

Normalization

the process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.

New cards
70

tools you use when working with databases include:

- Forms
- Queries
- Reports
- Modules

New cards
71

Forms

used to enter data into a database. This is only required if the database needs a user to enter data

New cards
72

Queries

used to search and filter a database

New cards
73

Reports

used to export data and present it in a way that is easy to read

New cards
74

NoSQL

A database that are built for specific data models and have flexible schemas for building modern applications

New cards
75

There are _____ fundamental components of any database schema

2

Physical database schema
Logical database schema

New cards
76

Physical database schema

The _______ database schema describes how data will be stored physically on a storage system and the form of storage used (files, key-value pairs, indices, etc.)

New cards
77

Logical database schema

The ______ database schema describes the logical constraints applied to the data and defines fields, tables, relations, views, integrity constraints, etc.

New cards
78

Types of Database Schemas

-Flat model
-Hierarchical model
-Network model
-Relational Model
-Star Schema
-Snowflake Schema

New cards
79

Flat model

Organizes data in a single, two-dimensional array—think of a Microsoft Excel spreadsheet or a CSV file

New cards
80

Web Service

the technology or software system designed to support interoperable machine to-machine interaction over a network

New cards
81

Markup Languages

A modern system for annotating a document in a way syntactically distinguishable from the text.

New cards
82

HTML

is a markup language used for creating documents for webpages. It defines the structure and layout of a Web document by using a variety of tags and attributes.

New cards
83

Style Sheets

a form of separation of presentation and content for web design

New cards
84

Client Side Scripting Languages

________ Scripting languages refer to the class of computer programs on the web executed by the user's web browser.

New cards
85

Server Side Scripting Languages

________ Scripting Languages are executed by the Web Server when the user requests a
document. They produce an output in a format understandable by Web Browsers (usually
HTML) and which are then sent to the user's computer

New cards
86

Sandboxed Languages

provide for application creation running in an independent environment.

New cards
87

Python

is an object-oriented language and is considered open source

New cards
88

Hierarchical model

Type of model that has a "tree-like" structure, with child nodes branching out from a root data node. This schema is ideal for storing nested data—for example,
family trees or biological taxonomies.

New cards
89

Network model

like the hierarchical model, treats data as nodes connected to each other; however, it allows for more complex connections, such as many- to-many relationships and cycles

New cards
90

Relational model

this model organizes data in a series of tables, rows, and columns, with relationships between different entities

New cards
91

Star schema

An evolution of the relational model that organizes data into "facts" (numerical) and "dimensions." (descriptive)

New cards
92

Snowflake schema

a further abstraction on top of the star schema. Fact tables point to dimensional tables, which can also have their own dimensional tables, expanding the descriptiveness possible within the database

New cards
93

Structured Query Language (SQL)

a programming nomenclature used to do set operations (like union, intersect, and minus) to organize and retrieve information in relational databases, based on "set theory and relational algebra."

New cards
94

GRAPHICAL USER INTERFACE (GUI)

user interface is the software layer (sometimes called a shell) used by an operator to communicate with the operating system.

New cards
95

COMMAND-LINE

is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands

New cards
96

CROSS DOMAIN DATA SOLUTIONS

offer information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains (i.e., Unclassified, Secret, or Top Secret). It gives us the ability to share information between systems of different security levels.

New cards
97

CYBERSPACE VULNERABILITY ASSESSMENT/HUNTER (CVA/H)

MISSION: executes vulnerability, compliance, defense and non-technical assessments, best practice reviews,
penetration testing and Hunter missions on Air Force and Department of Defense networks and
systems

New cards
98

(CVA/H) features

Mobile platform
On-site/Remotely
Deployable sensor platform
Gather/Analyze Data
Garrison platform
Connectivity for Remote Operations
Hunter Mission Focus
Find, Fix, Track, Target, Engage, Assess the Persistent Threat

New cards
99

CYBERSPACE DEFENSE ANALYSIS (CDA)

MISSION: provides operational effects designed to protect and defend critical Air Force data at the nexus of adversarial threats, Air Force priorities and key missions and user behavior on Air Force networks

New cards
100

(CDA) Features

Two variants designed to monitor, collect, analyze, and report information transmitted via unsecure telecommunications systems
Cyberspace operational risk assessment
Web risk assessment

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 194 people
... ago
5.0(6)
note Note
studied byStudied by 402 people
... ago
4.8(5)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 11193 people
... ago
4.6(63)
note Note
studied byStudied by 1008 people
... ago
5.0(4)

Explore top flashcards

flashcards Flashcard (93)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 74 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 17 people
... ago
4.0(2)
flashcards Flashcard (134)
studied byStudied by 6758 people
... ago
4.1(89)
robot