SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Function point
FP
KPI
B-to-G
BLP
2. Business-to-government
B-to-G
IrDA
TCO
CIM
3. Process ID
FDM
WSDL
IRC
PID
4. Network Control Protocol
NCP
EAM
FRB
RFID
5. Computer emergency response team
NIC
RADIUS
PAN
CERT
6. Description - discovery and integration
UDDI
RBAC
PERT
FTP
7. Entity relationship diagram
UDP
SDLC
ERD
SEC
8. Data-oriented system development
DOSD
WLAN
DID
DMZ
9. Information systems
IS
NIST
ESP
RA
10. Federal Financial Institutions Examination Council (USA)
CPM
FFIEC
SAN
HIPO
11. Voice-over Internet Protocol
PHY
UML
VoIP
SPICE
12. Identification and authentication
I&A
CSIRT
KPI
BI
13. Capability Maturity Model
CMM
ICMP
BOM
VoIP
14. Committee of Sponsoring Organizations of the Treadway Commission
JIT
NAT
BPR
COSO
15. Source lines of code
NFPA
DOSD
POC
SLOC
16. Object request broker (ORB)
ORB
SCOR
M&A
4GL
17. Data flow diagram
DFD
TKIP
EMRT
RW
18. Systems network architecture
I/O
SO
MAC
SNA
19. Infrared Data Association
IrDA
RPO
GB
CMDB
20. Single sign-on
RIP
BIMS
MAP
SSO
21. Name Server Protocol or Network service provider
NSP
WP
GB
COM
22. False-acceptance rate
CNC
DRP
FAR
L2TP
23. Knowledge base
ASCII
URI
KB
POS
24. Universal resource locator
IDEF1X
RPC
FRAD
URL
25. Maintenance out of service
UAT
MOS
MAC
RAS
26. Management information system
KB
MIS
OBS
BIOS
27. Group ID
SO
PAN
GID
IETF
28. Incident response management
MTBF
PMBOK
HIPAA
IRM
29. Fourth-generation language
COSO
4GL
SLA
RBAC
30. NT file system
ITF
IDE
AICPA
NTFS
31. Proof of possession
POP
COM/DCOM
FAR
UAT
32. Business process reengineering
BPR
ISAKMP/Oakley
PR
ERD
33. Address Resolution Protocol
TMS
CASE
ARP
ROM
34. Fast Fourier Transform
BRP
ROI
FFT
DLL
35. High-level data link control
GID
HDLC
DASD
EAC
36. Registration authority
EMI
DCE
PHY
RA
37. Business Continuity Institute
KB
BCI
Kb
IPMA
38. Dynamic Host Configuration Protocol
DHCP
EFT
CSO
PICS
39. Nondisclosure agreement
RFI
CA
NDA
S/MIME
40. Continuous and intermittent simulation
CIS
CCK
FP
DoS
41. Relational online analytical processing
NFS
ROLAP
FRB
EAC
42. Single point of contact
ARP
SPOC
SSO
DAC
43. Temporal Key Integrity Protocol
HDLC
TKIP
GB
DDoS
44. Wi-Fi Protected Access
ROLAP
WPA
AICPA
CSO
45. Artificial intelligence
DMS
IPX
AI
VLAN
46. Point of sale or Point-of-sale systems
PHY
PROM
PKI
POS
47. Intrusion detection system
IDS
TFTP
IPSec
CMM
48. Personal computer/microcomputer
MOS
CAM
OOSD
PC
49. Session border controller
CIS
ISAM
SBC
IP
50. Subject matter expert
URL
SNMP
SME
ECC