SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Continuous and intermittent simulation
BCI
CIS
DBMS
UBE
2. Set services identifiers
SSID
MTS
OBS
ISP
3. Data Encryption Standard
DRP
DES
HTML
MRP
4. Direct-sequence spread spectrum (DSSS)
DSSS
MTBF
ALE
FRR
5. Transaction processing (TP) monitors
TP monitors
ITIL
X-to-X
ERP
6. Global position system
ROLAP
DMS
TLS
GPS
7. Wi-Fi Protected Access
MOS
DMS
CIAC
WPA
8. Switched virtual circuits
RAID
CICA
Kb
SVC
9. Critical Path Methodology
RPC
CPM
XSL
IPS
10. Program Evaluation Review Technique
SEC
WBS
ISO
PERT
11. Structured Query Language
KLOC
SPI
SQL
CSO
12. Artificial intelligence
CRM
DOSD
CCTV
AI
13. American National Standards Institute
ANSI
TR
SOA
RIP
14. Equal-error rate
FIPS
EER
IS
SET
15. Personal identification number
IrDA
PIN
DASD
SPICE
16. Control Objectives for Information and related Technology
CICA
DMZ
COBIT
SPICE
17. Orthogonal frequency division multiplexing
DDN
PDN
ALE
OFDM
18. Call Data Distribution Function
M&A
JIT
WPAN
CDDF
19. Recovery time objective
RTO
URL
XSL
DSS
20. Graphical user interface
TLS
PICS
CSF
GUI
21. Management information system
SCARF/EAM
MIS
ALE
B-to-E
22. Temporal Key Integrity Protocol
EAM
TKIP
URN
TFTP
23. Direct access storage device
CSMA/CD
SCARF
DASD
ALE
24. Incident response management
COSO
DCE
IRM
NNTP
25. Compact disk
SIC
CICA
SNMP
CD
26. Data flow diagram
UBE
MSAUs
MODEM
DFD
27. Integrated services digital network
ISDN
AH
EAP
FEMA
28. Trivial File Transport Protocol
DSS
SCM
TFTP
WAP
29. Computer-aided system engineering
CGI
CASE
ITU
PER
30. Biometric Information Management and Security
BIMS
EVA
ECC
CSF
31. Secure digital multimedia card
SSO
SD/MMC
PBX
DCOM
32. Point of sale or Point-of-sale systems
UID
POS
POTS
KDSI
33. Universal resource locator
NFPA
URL
OLAP
CPO
34. Layer 2 Tunneling Protocol
BRP
L2TP
ESP
POTS
35. Security parameter index
TFTP
SPI
CPM
ID
36. Relational database management system
ROI
CPM
RDBMS
ISO
37. Common Object Request Broker Architecture
CIS
CSF
PROM
CORBA
38. Projects in Controlled Environments 2
BPR
CRC
GID
PRINCE2
39. Network file system
NFS
NTFS
ISAKMP/Oakley
DFD
40. Reset
CIO
RST
ICMP
PVC
41. Enterprise data flow architecture
EDFA
PERT
LAN
EC
42. Transport layer security
SDO
TP monitors
TLS
IDS
43. Public key infrastructure
SLM
PKI
I&A
BIOS
44. Specific - measurable - achievable - relevant - time-bound
DDoS
IP
L2TP
SMART
45. Security Association
SA
SCM
FRR
CMM
46. Customer relationship management
AES
SLM
VPN
CRM
47. Service delivery objective
FTP
SDO
COSO
PBX
48. Random access memory
RAM
COSO
TFTP
SCADA
49. Quality assurance testing
Bit
DID
ERD
QAT
50. Object Breakdown Structure
ORB
SNA
FRR
OBS