MOD I

5.0(1)
studied byStudied by 5 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/204

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:00 PM on 10/24/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

205 Terms

1
New cards

The Career Group is divided into 7 categories

1. Operations
2. Maintenance & Logistics
3. Support
4. Medical & Dental
5. Legal & Chaplain
6. Finance & Contracting
7. Special Investigation

2
New cards

Special duty assignment include:

Recruiter, First Sergeant, Military Training Instructors (MTI), and Embassy Duty

3
New cards

CAREER FIELD SUBDIVISION

A grouping of personnel with related work requirements and qualifications. (combination of 1st thru 3rd characters)

4
New cards

7-Skill Level

Craftsman skill level advancement will be accomplished upon achieving the rank of Staff Sergeant. At this time, Airmen will receive Craftsman training and 12 months OJT

5
New cards

9-Skill Level

Airmen are awarded Superintendent when promoted to Senior Master Sergeant.

6
New cards

WAPS

utilized for promotion eligibility an AF system for selecting Airman for rank promotion to Staff Sergeant (E-5) and Technical Sergeant (E-6). It was first implemented in 1969 and is still in use today.

7
New cards

WAPS Factors

Specialty Knowledge Test (SKT)
Promotion Fitness Examination (PFE)
Enlisted Performance Report (EPR)
Military Decorations and Awards

8
New cards

Specialty Knowledge Test (SKT)

Culminates with a 100 question test about individual jobs in the AF. Questions are taken from the Career Development Course (CDC). up to 100 points

9
New cards

Promotion Fitness Examination (PFE)

100 question test about AF general supervisory subjects such as enlisted military history, AF doctrine, Expeditionary Forces, Joint Forces, standards of conduct, legal issues, military customs, courtesies, protocols, leadership, training, education, dress and appearance, etc. The questions are taken from the AF Handbook 1 up to 100 points

10
New cards

Enlisted Performance Report (EPR)

up to 250 points - An evaluation of the performance of an enlisted member both on and off duty. It provides meaningful feedback to individuals on what is expected of them, advice on how well they are meeting those expectations and how to improve those expectations. You may be awarded up to 250 points over a total of your last three eligible reports

11
New cards

Military Decoration and Awards

AF members receive promotion points if they are awarded certain military decorations. The amount of points is based on the type of decoration awarded. up to 25 points

12
New cards

On-The-Job Training (OJT)

Provided to inexperienced employees supervised at the work site during the initial stages of employment.

13
New cards

Computer-Based Training (CBT)

Receiving instructions/knowledge through special training courses hosted on a computer system.

14
New cards

AFSC

is an alphanumeric code consisting of five characters describing the various jobs in the AF. This section is designed to identify each character within your AFSC and its relationship to the AF Mission

15
New cards

The 1st character is called the ___________. It identifies the AFSC in terms of its relationship to the AF Mission

Career Group

16
New cards

CAREER FIELD

The field indicates a functional grouping of personnel requiring basically the same knowledge and skills (combination of the AFSC's 1st and 2nd character)

17
New cards

SKILL LEVEL

Specifies the specific degree of experience an individual must obtains within the particular AFSC (The AFSC's 4th character)

18
New cards

1-Skill Level

Considered a Helper. This was received after the completion of Basic Military Training (BMT).

19
New cards

3-Skill Level

Airmen are awarded Apprentice upon completion of formal technical training

20
New cards

5-Skill Level

Technician . When this certification training is completed each individual will be consider "certified" to perform their job with minimal supervision. (12 Months OJT)

21
New cards

Learning Programs

Previously known as Career Development Course (CDC), are published instruction providing information to satisfy the career knowledge component of OJT. They are developed from references identified in the Career Field Education and Training Plan (CFETP)

22
New cards

Air Force Job Qualification Standard (AFJQS)

Comprehensive task list describing a particular job type or duty position. Supervisors use to document task qualification. The tasks are common to all persons serving in the described duty position.

23
New cards

Air Force Qualification Training Package (AFQTP)

Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment. It may be printed, computer- based or some other audiovisual media

24
New cards

CAREER FIELD EDUCATION AND TRAINING PLAN (CFETP)

A that plan standardizes the AFSC's skill level training requirements and establishes the framework for managing the career field education and training

25
New cards

The 8 core competencies of the 1D7X1B career field include

- Server operating systems
- System and User Accounts Services
- Contingency Operations
- Strategic and Budget Planning
- System/Database administration
- Project management
- Cloud Computing
- Network Security

26
New cards

1D7X1B RESPONSIBILITIES ARE:

System and User Accounts Services
Security
Contingency Operations
Strategic and Budget Planning

27
New cards

1D7X1B RESPONSIBILITIES

Provide core services at operating systems and server application levels Installing, supporting and maintaining servers and computer systems across networks

28
New cards

System and User Accounts Services

Managing system accounts
Group Policy and Remote Management
Account Management
Directory Services
Storage
Email
Secure Authentication
Fault Isolation
Restore Network Services
Manage Network Outages

29
New cards

Implement security policies - Manage Security Weaknesses on Network TCNOs, TCTOs, CTOs, NOTAMs/C4NOTAMs

Security

30
New cards

Vulnerability Management
Patching Systems
Antivirus Updates
Information Assurance Vulnerability Assessment (IAVAs)

Security

31
New cards

Classified Message Incidents (CMIs) response
Sanitize Systems

Security

32
New cards

Combat Information Transport System (CITS)
Standardize Network Infrastructure via COTS equipment
Maintains Compliance

Security

33
New cards

Information Warfare Operations Exploit an enemy's information systems and defend ours Develop Test, Tactics, Techniques and Procedures for missions

Contingency Operations

34
New cards

Operations identify, analyze, exploit adversary's network operations and systems based on rules of engagements (ROEs).

Contingency Operations

35
New cards

Restoral and Contingency operations plans
Develops and implement in case of emergency

Contingency Operations

36
New cards

Command, Control, Communication and Computer (C4) systems. System Lifecycle Management Collect Requirements and Supporting Documentation

Contingency Operations

37
New cards

Strategic and Budget Planning

Planning and Implementation Activities for Networks Equipment/Software purchases Project Installation Project Management Facility Design/Military Construction Planning

38
New cards

Mission Defense Teams

Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.

39
New cards

Directory Services

Provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.

40
New cards

Boundary Protection

The main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.

41
New cards

Infrastructure

Teams employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace.

42
New cards

Storage and Virtualization

Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving

43
New cards

Vulnerability Management

These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.

44
New cards

Monitoring

Provides situational awareness to all components, systems and network devices, of that which it monitors.

45
New cards

Information Assurance

This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication

46
New cards

Standard/Evaluation Team

This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures

47
New cards

Crew Operations

This team is responsible for the managing daily operations and directions.

48
New cards

1D7X1B DUTIES

Mission Defense Teams
Directory Services
Boundary Protection
Infrastructure
Storage and Virtualization
Vulnerability Management
Monitoring
Information Assurance
Standard/Evaluation Team
Crew Operations

49
New cards

Defense in Depth

an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system.

50
New cards

Proactive Defense

Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.

51
New cards

Network Standardization

Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements

52
New cards

Situational Awareness

Maintaining proper ___________ assists you in preparing for and recognizing a threat

53
New cards

PROGRAM

A set of instructions designed and written to perform a specific task within a computer system.

54
New cards

PROGRAMMING LAUNGUAGES

the description, measurement or expression of processes or algorithms and includes digital as well as non-digital data performed by computing machines.

55
New cards

Syntax

The way symbols, words and characters are formed within each programming language

56
New cards

Semantics

The meaning each set of characters convey when arranged in a particular way

57
New cards

There are _____ basic categories of programming languages

Two.
Low-level and High-level

58
New cards

Low-level Languages

This code is easily and readily executed by the computer without any assistance from any other program.

59
New cards

High-level languages

Computer language that is more user-friendly and offer a larger portability across various platforms. They are not limited by the computer hardware

60
New cards

There are ___ primary types of high level languages

Two
Interpreted and Compiled

61
New cards

Interpreted Programming Language

Code is saved in the same format entered and does not need to be compiled before execution

62
New cards

Compiled Programming Languages

Will translate the program directly into machine code specific to the target computer's CPU (This allows programs to generally run faster than interpreted ones)

63
New cards

Service

A function that is well-defined, self-contained and does not depend on the state of
other services. It is the endpoint of a connection.

64
New cards

Service-oriented architecture (SOA)

a design blueprint or framework for applications within an enterprise

65
New cards

Benefits of Service Oriented Architecture

Reusability
Interoperability
Scalability and Flexibility
Cost Efficiency

66
New cards

DATABASE

an organized collection of structured information, or data, typically stored electronically in a computer system.

67
New cards

Flat File Database

___ databases are databases of just one table. It can be created in database software or in a spreadsheet and is often saved as a CSV file (highly compatible between databases and other applications)

68
New cards

Relational Database

A large set of data about many different entities, allow data to be separated and connected across several tables. Tables are connected through primary and foreign keys to increase efficiency

69
New cards

Normalization

the process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.

70
New cards

tools you use when working with databases include:

- Forms
- Queries
- Reports
- Modules

71
New cards

Forms

used to enter data into a database. This is only required if the database needs a user to enter data

72
New cards

Queries

used to search and filter a database

73
New cards

Reports

used to export data and present it in a way that is easy to read

74
New cards

NoSQL

A database that are built for specific data models and have flexible schemas for building modern applications

75
New cards

There are _____ fundamental components of any database schema

2

Physical database schema
Logical database schema

76
New cards

Physical database schema

The _______ database schema describes how data will be stored physically on a storage system and the form of storage used (files, key-value pairs, indices, etc.)

77
New cards

Logical database schema

The ______ database schema describes the logical constraints applied to the data and defines fields, tables, relations, views, integrity constraints, etc.

78
New cards

Types of Database Schemas

-Flat model
-Hierarchical model
-Network model
-Relational Model
-Star Schema
-Snowflake Schema

79
New cards

Flat model

Organizes data in a single, two-dimensional array—think of a Microsoft Excel spreadsheet or a CSV file

80
New cards

Web Service

the technology or software system designed to support interoperable machine to-machine interaction over a network

81
New cards

Markup Languages

A modern system for annotating a document in a way syntactically distinguishable from the text.

82
New cards

HTML

is a markup language used for creating documents for webpages. It defines the structure and layout of a Web document by using a variety of tags and attributes.

83
New cards

Style Sheets

a form of separation of presentation and content for web design

84
New cards

Client Side Scripting Languages

________ Scripting languages refer to the class of computer programs on the web executed by the user's web browser.

85
New cards

Server Side Scripting Languages

________ Scripting Languages are executed by the Web Server when the user requests a
document. They produce an output in a format understandable by Web Browsers (usually
HTML) and which are then sent to the user's computer

86
New cards

Sandboxed Languages

provide for application creation running in an independent environment.

87
New cards

Python

is an object-oriented language and is considered open source

88
New cards

Hierarchical model

Type of model that has a "tree-like" structure, with child nodes branching out from a root data node. This schema is ideal for storing nested data—for example,
family trees or biological taxonomies.

89
New cards

Network model

like the hierarchical model, treats data as nodes connected to each other; however, it allows for more complex connections, such as many- to-many relationships and cycles

90
New cards

Relational model

this model organizes data in a series of tables, rows, and columns, with relationships between different entities

91
New cards

Star schema

An evolution of the relational model that organizes data into "facts" (numerical) and "dimensions." (descriptive)

92
New cards

Snowflake schema

a further abstraction on top of the star schema. Fact tables point to dimensional tables, which can also have their own dimensional tables, expanding the descriptiveness possible within the database

93
New cards

Structured Query Language (SQL)

a programming nomenclature used to do set operations (like union, intersect, and minus) to organize and retrieve information in relational databases, based on "set theory and relational algebra."

94
New cards

GRAPHICAL USER INTERFACE (GUI)

user interface is the software layer (sometimes called a shell) used by an operator to communicate with the operating system.

95
New cards

COMMAND-LINE

is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands

96
New cards

CROSS DOMAIN DATA SOLUTIONS

offer information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains (i.e., Unclassified, Secret, or Top Secret). It gives us the ability to share information between systems of different security levels.

97
New cards

CYBERSPACE VULNERABILITY ASSESSMENT/HUNTER (CVA/H)

MISSION: executes vulnerability, compliance, defense and non-technical assessments, best practice reviews,
penetration testing and Hunter missions on Air Force and Department of Defense networks and
systems

98
New cards

(CVA/H) features

Mobile platform
On-site/Remotely
Deployable sensor platform
Gather/Analyze Data
Garrison platform
Connectivity for Remote Operations
Hunter Mission Focus
Find, Fix, Track, Target, Engage, Assess the Persistent Threat

99
New cards

CYBERSPACE DEFENSE ANALYSIS (CDA)

MISSION: provides operational effects designed to protect and defend critical Air Force data at the nexus of adversarial threats, Air Force priorities and key missions and user behavior on Air Force networks

100
New cards

(CDA) Features

Two variants designed to monitor, collect, analyze, and report information transmitted via unsecure telecommunications systems
Cyberspace operational risk assessment
Web risk assessment