SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Extensible Markup Language
SMF
CDPD
RADIUS
XML
2. Orthogonal frequency division multiplexing
M&A
OFDM
API
CGI
3. Bank for International Settlements
CRM
BIS
OFDM
PCR
4. Object Breakdown Structure
PSTN
OBS
ROM
EIGRP
5. Unsolicited bulk e-mail
CPM
CASE
UBE
COOP
6. Function point
FP
CoS
FRR
RST
7. Function point analysis
PAN
FPA
XBRL
RADIUS
8. Asynchronous time division multiplexing
ATDM
PPTP
CORBA
CPU
9. Certification practice statement
WAP
KB
RBAC
CPS
10. Federal Information Processing Standards
USB
FIPS
RPO
IETF
11. Teletype network
TELNET
IPRs
EIGRP
WORM
12. Metropolitan area network
VPN
PMI
MAN
NTFS
13. Virtual private network
UBE
VPN
DCT
SSH
14. Chief privacy officer
CPO
ITSM
ERP
CODASYL
15. Frame relay assembler/disassembler
B-to-C
RAID
FRAD
DNS
16. Remote access service
BIS
WWAN
RAS
ORB
17. Management information system
M&A
OO
MIS
RA
18. Business impact analysis
FERC
BIA
BIMS
NFS
19. Database management system
PAD
SLIP
KB
DBMS
20. Conference on Data Systems Language
CODASYL
CCM
FTP
ACL
21. Integration Definition for Information Modeling
IDEF1X
FPA
TR
PC
22. Health Insurance Portability and Accountability Act (USA)
SOHO
HIPAA
SCARF
GB
23. Specific - measurable - achievable - relevant - time-bound
KDSI
RAS
DDoS
SMART
24. Identification
RAM
KLOC
PVC
ID
25. Disaster recovery planning
DRP
OCSP
IRC
KLOC
26. IP Security
X-to-X
CIM
IPSec
CDDF
27. Project Management Institute
FRB
RFID
PMI
COSO
28. Computer Incident Advisory Capability
HA
CoS
CIAC
FPA
29. Digital subscriber lines
WPAN
ESP
HW/SW
DSL
30. High availability
RST
ITIL
EDFA
HA
31. Intrusion prevention system
IPS
ASCII
RFI
B-to-G
32. Business process reengineering
LCP
DTR
BPR
TELNET
33. Projects in Controlled Environments 2
EER
KPI
PRINCE2
AI
34. Disaster Recovery Institute International
RPO
DRII
ANSI
NSP
35. Database administrator
DBA
DECT
DOSD
IPF
36. Request for proposal
POP
RFP
AI
WPA
37. Component Object Model
WORM
COM
COOP
CRL
38. Distributed computing environment
SPICE
DCE
SPI
DTR
39. Internetwork Packet Exchange
ANSI
CERT
IPX
DRP
40. Rewritable
FTP
RW
EMI
RMI
41. Radio frequency identification
RFID
RAM
TELNET
NCP
42. Voice-Over IP
RFI
SIC
VoIP
POS
43. High definition/high density-digital video disc
TQM
4GL
Xquery
HD-DVD
44. Point-to-Point Tunneling Protocol
PPTP
SPI
ATDM
PID
45. Distributed Component Object Model (Microsoft)
SQL
ALU
ITT
DCOM
46. Layer 2 Tunneling Protocol
EC
L2TP
EIGRP
DVD
47. Arithmetic-logic unit
ALU
BIS
MAC
CPM
48. Certificate authority
MIS
RAD
CA
AH
49. Statement on Auditing Standards
QAT
FDDI
MOS
SAS
50. Data-oriented system development
ROM
DOSD
TCP/IP
PMBOK