Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Gigabyte






2. Occupant emergency plan






3. Integrated test facility






4. Security Association






5. Digital video disc-high definition/high density






6. Internet Control Message Protocol






7. Federal Reserve Board (USA)






8. Wireless Application Protocol






9. Common gateway interface






10. IT service management






11. Chief information security officer






12. Internet relay chat






13. Plain old telephone service






14. Mergers and acquisition






15. Structured Query Language






16. Set services identifiers






17. System development life cycle






18. Federal Energy Regulatory Commission (USA)






19. Digital audio tape






20. Enterprise architecture






21. Unsolicited bulk e-mail






22. National Institute of Standards and Technology (USA)






23. Fibre channels






24. Entity relationship diagram






25. Bill of materials






26. Serial Line Internet Protocol






27. Generalized audit software






28. Unified Modeling Language






29. Modulator/demodulator






30. Extensible Authentication Protocol






31. American Institute of Certified Public Accountants






32. Secured Hypertext Transmission Protocol






33. Routing Information Protocol






34. Transmission Control Protocol/User Datagram Protocol






35. Work packages






36. Application-specific integrated circuit






37. Business continuity planning






38. Certification practice statement






39. Recovery point objective






40. Transport layer security






41. Multiprotocol label switching






42. Intrusion detection system






43. Computerized Numeric Control






44. Hypertext Markup Language






45. Specific - measurable - achievable - relevant - time-bound






46. Federal Information Processing Standards






47. Extensible Markup Language






48. Federal enterprise architecture






49. Open Systems Interconnection






50. Data-oriented system development