SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Secure Shell
SOHO
NFPA
B-to-C
SSH
2. Distributed computing environment
PPTP
DCE
RAS
NIC
3. Equal-error rate
EER
CODASYL
RFP
NFS
4. Tape management system
RIP
PID
KB
TMS
5. Mean time to repair
MTTR
IDE
DTE
NT
6. Federal enterprise architecture
FEA
UBE
ARP
TCP/IP
7. Hardware/software
FER
ITSM
CICA
HW/SW
8. Open Systems Interconnection
IPMA
TELNET
Kb
OSI
9. Annual loss expectancy
ALE
QA
ISO
IRM
10. Closed-circuit television
CCTV
PID
SLA
HW/SW
11. Cellular Digital Packet Data
ESP
CSO
IrDA
CDPD
12. Secure digital multimedia card
SD/MMC
CNC
SMART
RST
13. Network interface card
IPS
L2TP
NIC
IETF
14. Business intelligence
WEP
Xquery
BI
KDSI
15. Constructive Cost Model
SCARF/EAM
HTTPS
OS
CCM
16. High availability
HA
PERT
PICS
ATM
17. Elliptical curve cryptography
SMART
ECC
B-to-E
RAID
18. Digital video disc-high definition/high density
KB
ROM
DVD-HD
I&A
19. Source lines of code
SLOC
SSH
IRC
DECT
20. Secure Sockets Layer
IDE
SSL
IP
POS
21. World Wide Web
FTP
WWW
RAS
CSIRT
22. Data Encryption Standard
MTTR
Xquery
DES
ISDN
23. Electromagnetic interference
TCP
EMI
PRD
DECT
24. Transmission Control Protocol/User Datagram Protocol
CIAC
SSL
TCP/UDP
WAN
25. Service level management
SLM
POTS
EMRT
IS
26. Demilitarized zone
DMZ
NNTP
ACID
QAT
27. Computer-assisted engineering
CAE
WML
BSC
CGI
28. Data-oriented system development
XML
PPP
WLAN
DOSD
29. Layer 2 Tunneling Protocol
BNS
LCP
BCP
L2TP
30. Unsolicited bulk e-mail
TKIP
MRP
EFT
UBE
31. Business recovery (or resumption) plan
DVD-HD
TACACS
LAN
BRP
32. Remote procedure call
RPC
NTP
SCARF
PAN
33. Direct inward dial
DID
IrDA
DTR
BIS
34. Call Data Distribution Function
EFT
ITSM
CDDF
QA
35. Intrusion prevention system
IPS
DFD
DRII
PC
36. Securities and Exchange Commission (USA)
IPRs
ACL
BSC
SEC
37. Packet assembler/disassembler
PAD
AES
CIO
SPOC
38. Internet protocol
ISAM
RAS
EIGRP
IP
39. Virtual private network
HTML
VPN
EAI
SMF
40. Program Evaluation Review Technique
CORBA
DSSS
PERT
TLS
41. Decision support systems
OO
DSS
UAT
EDI
42. Hypertext Markup Language
PRD
HTML
DECT
FFT
43. Request for proposal
QA
MTS
RFP
IS
44. Technical report
ALU
CIM
PSTN
TR
45. Embedded audit module
PAN
EAM
PER
COSO
46. Project Initiation Document
IR
PID
CoS
CGI
47. Total cost of ownership
TCO
WSDL
XML
ISAM
48. Session border controller
ATM
GIS
SCARF
SBC
49. Specific - measurable - achievable - relevant - time-bound
FC
SMART
ISAKMP/Oakley
IPSec
50. Enterprise application integration
EAI
FRAD
CIO
SME