Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Project request document






2. Mean time to repair






3. Frame relay assembler/disassembler






4. Electronic funds transfer






5. Federal Emergency Management Association (USA)






6. Multistation access units






7. Network Control Protocol






8. System generation






9. Single point of contact






10. Critical Path Methodology






11. Distributed Component Object Model (Microsoft)






12. Secure Multipurpose Internet Mail Extensions






13. Electromagnetic interference






14. Total quality management






15. Failure-to-enroll rate






16. Network interface card






17. False-rejection rate






18. Embedded audit module






19. False-acceptance rate






20. Plan-Do-Check-Act






21. Compact disk-recordable






22. Internet service provider






23. Conference on Data Systems Language






24. Disaster Recovery Institute International






25. Wireless local area network






26. Business Continuity Institute






27. Plain old telephone service






28. Enhanced Interior Gateway Routing Protocol






29. Redundant Array of Inexpensive Disks






30. Serial Line Internet Protocol






31. Key performance indicator






32. Manufacturing accounting and production






33. Function point analysis






34. Uninterruptible power supply






35. Terminal emulation software






36. Computer security incident response team






37. Network Time Protocol






38. Encapsulating security payload






39. Secure Shell






40. Biometric Information Management and Security






41. Simple Mail Transport Protocol






42. Graphical user interface






43. Application programming interface






44. Transmission Control Protocol/User Datagram Protocol






45. Capability Maturity Model






46. System development life cycle






47. Radio frequency






48. Decision support systems






49. Point-to-Point Tunneling Protocol






50. Computer-assisted audit technique