Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Function point






2. Business-to-government






3. Process ID






4. Network Control Protocol






5. Computer emergency response team






6. Description - discovery and integration






7. Entity relationship diagram






8. Data-oriented system development






9. Information systems






10. Federal Financial Institutions Examination Council (USA)






11. Voice-over Internet Protocol






12. Identification and authentication






13. Capability Maturity Model






14. Committee of Sponsoring Organizations of the Treadway Commission






15. Source lines of code






16. Object request broker (ORB)






17. Data flow diagram






18. Systems network architecture






19. Infrared Data Association






20. Single sign-on






21. Name Server Protocol or Network service provider






22. False-acceptance rate






23. Knowledge base






24. Universal resource locator






25. Maintenance out of service






26. Management information system






27. Group ID






28. Incident response management






29. Fourth-generation language






30. NT file system






31. Proof of possession






32. Business process reengineering






33. Address Resolution Protocol






34. Fast Fourier Transform






35. High-level data link control






36. Registration authority






37. Business Continuity Institute






38. Dynamic Host Configuration Protocol






39. Nondisclosure agreement






40. Continuous and intermittent simulation






41. Relational online analytical processing






42. Single point of contact






43. Temporal Key Integrity Protocol






44. Wi-Fi Protected Access






45. Artificial intelligence






46. Point of sale or Point-of-sale systems






47. Intrusion detection system






48. Personal computer/microcomputer






49. Session border controller






50. Subject matter expert