Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Equal-error rate






2. Occupant emergency plan






3. Kilo lines of code






4. IT service management






5. Simple Network Management Protocol






6. Network Control Protocol






7. Annual loss expectancy






8. Application programming interface






9. Dynamic link library






10. Subject matter expert






11. Plan-Do-Check-Act






12. Enterprise resource planning






13. Bypass label process






14. Digital Divide Network






15. Program change request






16. Terminal emulation software






17. IS disaster recovery planning






18. Mean time between failures






19. Transmission Control Protocol/Internet Protocol






20. Orthogonal frequency division multiplexing






21. Wide area network






22. Program Evaluation Review Technique






23. Source lines of code






24. Internet Engineering Task Force






25. Digital audio tape






26. Secured Hypertext Transmission Protocol






27. Manufacturing resources planning






28. Distributed Component Object Model (Microsoft)






29. Quality assurance






30. Extended Binary-coded for Decimal Interchange Code






31. Invitation to tender






32. Biometric Information Management and Security






33. Chief security officer






34. Business continuity management






35. Name Server Protocol or Network service provider






36. IT Governance Institute






37. Hierarchy input-process-output






38. Discretionary access controls






39. Direct inward dial






40. Object-oriented






41. Wireless wide area network






42. Mandatory Access Control






43. Atomicity - consistency - isolation and durability






44. Electronic funds transfer






45. Global position system






46. Extensible Markup Language






47. Software Process Improvement and Capability Determination






48. Network address translation






49. Computer Incident Advisory Capability






50. Object Breakdown Structure