Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. File allocation table






2. Encapsulating security payload






3. Storage area network






4. Source lines of code






5. Secure digital multimedia card






6. Occupant emergency plan






7. Enterprise resource planning






8. Enterprise application integration






9. IP Security






10. Thousand delivered source instructions






11. Object-oriented






12. Supply Chain Management






13. Remote method invocation






14. Digital Enhanced Cordless Telecommunications






15. Enhanced Interior Gateway Routing Protocol






16. Conference on Data Systems Language






17. Information systems






18. American National Standards Institute






19. Federal Financial Institutions Examination Council (USA)






20. Quality assurance testing






21. Temporal Key Integrity Protocol






22. Estimates at completion






23. Secure Multipurpose Internet Mail Extensions






24. Secure electronic transactions






25. Disk management system






26. Read-only memory






27. Project Initiation Document






28. Digital video disc-high definition/high density






29. Capability Maturity Model Integration






30. Critical success factor






31. Projects in Controlled Environments 2






32. Federal Reserve Board (USA)






33. High definition/high density-digital video disc






34. Enterprise architecture






35. Discrete Cosine Transform






36. Digital audio tape






37. Federal Emergency Management Association (USA)






38. Proof of possession






39. Distributed Component Object Model (Microsoft)






40. Physical layer






41. Supervisory Control and Data Acquisition






42. Business process reengineering






43. Network interface card






44. Input/output






45. Secured Hypertext Transmission Protocol






46. Transmission Control Protocol/Internet Protocol






47. Wireless personal area network






48. Application programming interface






49. Rewritable






50. Constructive Cost Model