Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remote Access Dial-in User Service






2. Universal Serial Bus






3. Backbone network services






4. Random access memory






5. Registration authority






6. Critical Path Methodology






7. Plan-Do-Check-Act






8. Remote procedure call






9. Thousand delivered source instructions






10. Project Initiation Document






11. Time-division multiplexing






12. Secured Hypertext Transmission Protocol






13. Frequency-hopping spread spectrum






14. Earned value analysis






15. Internet Control Message Protocol






16. Role-based access control






17. Specific - measurable - achievable - relevant - time-bound






18. International Telecommunications Union






19. Biometric Information Management and Security






20. Data terminal ready






21. Distributed denial of service






22. Kilobyte






23. Exchange-to-Exchange






24. Enterprise architecture






25. Supply Chain Operations Reference






26. Network News Transfer Protocol






27. Disaster Recovery Institute International






28. File Transfer Protocol






29. Data warehouse






30. Indexed Sequential Access Method






31. NT file system






32. Recovery time objective






33. IT Governance Institute






34. Unified Modeling Language






35. Critical success factor






36. Source lines of code






37. Name Server Protocol or Network service provider






38. Estimates at completion






39. Personal computer/microcomputer






40. Computer-aided software engineering






41. Intrusion prevention system






42. Electronic commerce






43. Emergency response time






44. High-level data link control






45. Simple Network Management Protocol






46. Business process reengineering






47. Graphical user interface






48. User Datagram Protocol






49. Continuous and intermittent simulation






50. Metropolitan area network