Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mean time between failures






2. Chief security officer






3. Dynamic Host Configuration Protocol






4. Conference on Data Systems Language






5. Security parameter index






6. Supervisory Control and Data Acquisition






7. Integrated services digital network






8. Central processing unit






9. Hardware/software






10. Secure Sockets Layer






11. Open Systems Interconnection






12. Physical layer






13. Federal Emergency Management Association (USA)






14. Secured Hypertext Transmission Protocol






15. Generalized audit software






16. Wired Equivalent Privacy






17. Internet service provider






18. Programmable Read-Only Memory






19. Electronic commerce






20. Transport layer security






21. Computer-integrated manufacturing






22. Advanced Encryption Standard






23. Program change request






24. Web Services Description Language






25. Failure-to-enroll rate






26. Hypertext Markup Language






27. File Transfer Protocol






28. Kilo lines of code






29. Organization for Economic Cooperation and Development






30. Supply Chain Management






31. Redundant Array of Inexpensive Disks






32. Kilobyte






33. Online Certificate Status Protocol






34. Service level management






35. Systems network architecture






36. Business intelligence






37. Continuous and intermittent simulation






38. Digital Enhanced Cordless Telecommunications






39. Critical success factor






40. Switched virtual circuits






41. Data-oriented system development






42. Unifom resource name






43. Secure electronic transactions






44. Direct inward dial






45. Hierarchy input-process-output






46. Point-to-point Protocol Over Ethernet






47. Recovery time objective






48. Enterprise data flow architecture






49. Temporal Key Integrity Protocol






50. Occupant emergency plan