SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer emergency response team
DTE
CERT
B-to-G
PPPoE
2. Description - discovery and integration
FRR
SSH
UDDI
GID
3. American Institute of Certified Public Accountants
EAI
NIST
PERT
AICPA
4. Certification practice statement
ID
SOHO
CPS
FDM
5. Permanent virtual circuit
PVC
MTS
TFTP
RAS
6. Virtual local area network
RAS
VLAN
CIS
WPAN
7. Binary digit
SMTP
Bit
MRP
MTBF
8. Computer-assisted audit technique
CAAT
B-to-C
RTO
IPX
9. Bypass label process
BLP
CRM
VPN
RIP
10. Recovery time objective
EBCDIC
ID
GSM
RTO
11. Network access point
NAP
MODEM
ITT
RTO
12. Multiprotocol label switching
EAM
XML
MPLS
DES
13. Failure-to-enroll rate
DVD
FER
EJB
RFID
14. Platform for Internet content selection
PICS
TELNET
GID
NIST
15. Write-once and read many
IPS
DCE
WLAN
WORM
16. Voice-over Internet Protocol
VoIP
SNA
RPC
IRC
17. New technology
WLAN
NT
HD-DVD
DBMS
18. Recovery point objective
BIMS
RPO
CGI
RW
19. IT Governance Institute
ITGI
SSH
BCP
CAD
20. Database management system
UDDI
CD-RW
UML
DBMS
21. Direct inward dial
DID
PDCA
SDLC
POP
22. Identification
TKIP
ID
EMI
ERP
23. Certificate authority
RW
CSMA/CD
CA
MAP
24. Routing Information Protocol
ATDM
RIP
ISAKMP/Oakley
PPTP
25. Equal-error rate
FC
MOS
EMI
EER
26. Public key infrastructure
PKI
HIPAA
KB
PRD
27. Chief executive officer
COSO
PRD
CEO
WWW
28. Work packages
PICS
WP
DES
ALE
29. Access control list
FERC
ROI
POC
ACL
30. Radio frequency identification
MAC address
PAD
BIOS
RFID
31. Computer-integrated manufacturing
CAAT
ISO
DBMS
CIM
32. Point-to-Point Tunneling Protocol
PPTP
BCI
DW
DSSS
33. Total cost of ownership
WPAN
DMS
KB
TCO
34. Discretionary access controls
DAC
CPU
KB
FRR
35. Frequency-hopping spread spectrum
PVC
PID
FHSS
ALU
36. Balanced scorecard
QA
FAR
BSC
SLM
37. Enterprise java beans
SEC
EJB
SDLC
ACL
38. Storage area network
ATDM
SAN
BIA
BCI
39. Switched virtual circuits
RAM
SVC
SSH
MTBF
40. Uniform resource identifier
ROI
RA
RAS
URI
41. Network Control Protocol
NCP
WPAN
EVA
NFPA
42. Authentication header
BIA
IPX
AH
PROM
43. Information technology
NAP
RAID
IT
WWW
44. Computer security incident response team
HIPAA
CSIRT
PVC
PHY
45. Exchange-to-Exchange
GIS
SMART
SMTP
X-to-X
46. Cellular Digital Packet Data
UDP
CDPD
DVD
SAS
47. Secure Hypertext Transfer Protocol
S/HTTP
BSC
IR
SAS
48. Fibre channels
HW/SW
FC
PRINCE2
DSSS
49. Constructive Cost Model
DASD
UDDI
OSPF
CCM
50. Process ID
PID
IPRs
IPMA
NAP