SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Common Object Request Broker Architecture
OCSP
OS
GSM
CORBA
2. Source lines of code
CISO
SLOC
RPC
PC
3. Description - discovery and integration
XBRL
UDDI
IDS
CCTV
4. Information technology
IT
DTE
FRB
BPR
5. Public switched telephone network
DIP
PSTN
UML
EIGRP
6. Trivial File Transport Protocol
TFTP
MSAUs
EC
CCTV
7. Total quality management
FAT
DCE
S/HTTP
TQM
8. Proof of concept
ITU
TMS
GIS
POC
9. Business impact analysis
ISO
PC
BIA
IPMA
10. Frame relay assembler/disassembler
POTS
FRAD
HIPO
EVA
11. Disaster Recovery Institute International
DRII
HTTP
CD-R
NSP
12. Class-of-service
S/MIME
FP
CoS
PERT
13. Computer security incident response team
HTTP
I&A
CSIRT
GSM
14. International Organization for Standardization
UID
ISO
ITF
Kb
15. Kilobyte
KB
DTE
PMBOK
EDFA
16. Discretionary access controls
RF
GID
DAC
Kb
17. Specific - measurable - achievable - relevant - time-bound
AH
COCOMO2
SLM
SMART
18. Computerized Numeric Control
KDSI
CCK
CNC
NTFS
19. High definition/high density-digital video disc
ACID
MAN
HD-DVD
SCM
20. Multiprotocol label switching
NIST
LAN
TQM
MPLS
21. Estimates at completion
RDBMS
UDP
RST
EAC
22. Chief privacy officer
DCT
SBC
OO
CPO
23. IP Security
BOM
Bit
HIPAA
IPSec
24. User ID
SMART
SA
KGI
UID
25. Input/output
DSSS
EER
OECD
I/O
26. Just in time
SOHO
SA
EER
JIT
27. Unsolicited bulk e-mail
ISAM
DNS
UBE
BOM
28. False-acceptance rate
UDDI
SSID
EJB
FAR
29. System management facility
MAC
EIGRP
SMF
AES
30. Address Resolution Protocol
IPRs
QA
ARP
WP
31. Equal-error rate
ATM
PCR
DCT
EER
32. Federal Information Processing Standards
FIPS
WML
POS
SD/MMC
33. Internet relay chat
ALE
TFTP
IRC
IR
34. Group ID
OOSD
ALU
GID
SVC
35. Transaction processing (TP) monitors
SBC
XBRL
TP monitors
GSM
36. Plan-Do-Check-Act
MTBF
EVA
PDCA
CRL
37. Write-once and read many
WORM
XBRL
SPOC
CSO
38. Secure Multipurpose Internet Mail Extensions
CIM
XML
PSTN
S/MIME
39. Information and communication technologies
URI
BRP
ISO
ICT
40. Packet assembler/disassembler
OEP
PAD
DLL
ESP
41. Redundant Array of Inexpensive Disks
PVC
CSMA/CD
AI
RAID
42. Proof of possession
POP
QAT
ID
TES
43. Data Definition Language
DDL
CGI
EBCDIC
URN
44. Organization for Economic Cooperation and Development
ACL
PAN
ITT
OECD
45. Constructive Cost Model
CERT
COCOMO2
FC
DVD
46. Microsoft's Transaction Server
BOMP
CSIRT
EJB
MTS
47. Personal digital assistant
BLP
COBIT
ITT
PDA
48. Direct-sequence spread spectrum (DSSS)
DMS
DSSS
CASE
SMF
49. Emergency response time
HA
IPX
KLOC
EMRT
50. Program change request
BCP
DES
SYSGEN
PCR