Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer emergency response team






2. Description - discovery and integration






3. American Institute of Certified Public Accountants






4. Certification practice statement






5. Permanent virtual circuit






6. Virtual local area network






7. Binary digit






8. Computer-assisted audit technique






9. Bypass label process






10. Recovery time objective






11. Network access point






12. Multiprotocol label switching






13. Failure-to-enroll rate






14. Platform for Internet content selection






15. Write-once and read many






16. Voice-over Internet Protocol






17. New technology






18. Recovery point objective






19. IT Governance Institute






20. Database management system






21. Direct inward dial






22. Identification






23. Certificate authority






24. Routing Information Protocol






25. Equal-error rate






26. Public key infrastructure






27. Chief executive officer






28. Work packages






29. Access control list






30. Radio frequency identification






31. Computer-integrated manufacturing






32. Point-to-Point Tunneling Protocol






33. Total cost of ownership






34. Discretionary access controls






35. Frequency-hopping spread spectrum






36. Balanced scorecard






37. Enterprise java beans






38. Storage area network






39. Switched virtual circuits






40. Uniform resource identifier






41. Network Control Protocol






42. Authentication header






43. Information technology






44. Computer security incident response team






45. Exchange-to-Exchange






46. Cellular Digital Packet Data






47. Secure Hypertext Transfer Protocol






48. Fibre channels






49. Constructive Cost Model






50. Process ID