Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage area network






2. Application-specific integrated circuit






3. Microsoft's Transaction Server






4. Supply Chain Operations Reference






5. Federal enterprise architecture






6. Universal Serial Bus






7. False-rejection rate






8. Rapid application development






9. American Institute of Certified Public Accountants






10. Biometric Information Management and Security






11. Service level agreement






12. Database management system






13. Structured Query Language






14. Dynamic Host Configuration Protocol






15. Geographic information systems






16. Control Objectives for Information and related Technology






17. Network interface card






18. Permanent virtual circuit






19. Nondisclosure agreement






20. Business Continuity Institute






21. Dynamic link library






22. Digital video disc-high definition/high density






23. Redundant Array of Inexpensive Disks






24. Capability Maturity Model






25. Open Shortest Path First






26. Network address translation






27. International Organization for Standardization






28. Kilobyte






29. Initial program load






30. System generation






31. Incident response






32. Component Object Model/Distributed Component Object Model






33. File Transfer Protocol






34. International Telecommunications Union






35. Radio frequency identification






36. Projects in Controlled Environments 2






37. Identification






38. Network file system






39. Call Data Distribution Function






40. Complimentary Code Keying






41. Read-only memory






42. Transaction processing (TP) monitors






43. Business-to-government






44. Binary digit






45. Metropolitan area network






46. Conference on Data Systems Language






47. Remote Access Dial-in User Service






48. Set services identifiers






49. Secure electronic transactions






50. Frequency division multiplexing