SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Secure digital multimedia card
CSU-DSU
EMI
NT
SD/MMC
2. User Datagram Protocol
EVA
PAD
GIS
UDP
3. Data communications equipment
CSIRT
DTR
CDDF
DCE
4. Internet Engineering Task Force
DDN
IETF
FDDI
BIOS
5. Estimates at completion
GUI
NSP
B-to-E
EAC
6. Switched virtual circuits
WEP
SCARF/EAM
SVC
ROLAP
7. Embedded audit module
ESP
CASE
EA
EAM
8. Certificate revocation list
TCO
CSF
DSSS
CRL
9. Plain old telephone service
FFT
DMZ
DLL
POTS
10. Incident response
SPI
IR
CCK
NFPA
11. Quality assurance testing
MOS
GIS
QAT
SCM
12. Federal Reserve Board (USA)
FRB
OSPF
CRC
BI
13. Program Evaluation Review Technique
ROI
PERT
CDDF
SDO
14. Internet protocol
EC
PBX
IP
SME
15. Business-to-government
LCP
NTFS
B-to-G
GIS
16. Internet Security Association and Key Management Protocol/Oakley
VLAN
CCK
SOAP
ISAKMP/Oakley
17. Business recovery (or resumption) plan
MTBF
BRP
EAI
DNS
18. Chief security officer
PRINCE2
CD
ERD
CSO
19. Address Resolution Protocol
MRP
AI
ARP
CPS
20. Voice-over Internet Protocol
IRM
RFP
VoIP
NTP
21. Control Objectives for Information and related Technology
EBCDIC
DDoS
CAAT
COBIT
22. Request for proposal
AH
RFP
SPICE
WORM
23. Data flow diagram
TCP/UDP
CDDF
DVD
DFD
24. File Transfer Protocol
FTP
EC
CPS
NFPA
25. Maintenance out of service
EDI
DMS
MOS
SSH
26. Internet Control Message Protocol
MAP
POS
ISAM
ICMP
27. Key goal indicator
FAT
UDP
KGI
RW
28. Software Process Improvement and Capability Determination
PDN
FEA
IPX
SPICE
29. Complimentary Code Keying
BCP
TACACS
SET
CCK
30. Project Initiation Document
VoIP
PID
IPMA
DDoS
31. Disaster Recovery Institute International
MRP
DRII
RF
IRM
32. Atomicity - consistency - isolation and durability
ACID
M&A
CISO
PMBOK
33. Direct access storage device
ITF
EVA
DTE
DASD
34. Enterprise architecture
ASCII
MAN
EA
ICMP
35. Electronic funds transfer
WORM
IRM
AI
EFT
36. Public relations
PR
DRP
MIS
GSM
37. Personal area network
UPS
PAN
KLOC
IDEF1X
38. Programmable Read-Only Memory
CODASYL
UBE
PROM
BIA
39. Virtual local area network
VLAN
I/O
TES
COBIT
40. Remote Access Dial-in User Service
DMS
EFT
RADIUS
IRC
41. Computer Incident Advisory Capability
CIAC
PCR
BCM
HTTPS
42. Digital video disc-high definition/high density
SBC
DVD-HD
DHCP
XML
43. Bill of materials
BOM
BOMP
FER
HTTPS
44. Mandatory Access Control
KB
UDP
PPP
MAC
45. Total cost of ownership
TCO
NIST
EC
PDN
46. Artificial intelligence
NSP
AI
CPS
ITGI
47. False-rejection rate
FRR
MTBF
SMTP
MAN
48. Routing Information Protocol
HTML
RIP
PBX
DASD
49. Elliptical curve cryptography
ECC
TMS
UAT
WLAN
50. Hypertext Transmission Protocol
NIST
HTTP
SPOOL
OOSD