Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NT file system






2. Network file system






3. National Fire Protection Agency (USA)






4. Nondisclosure agreement






5. Network interface card






6. Universal resource locator






7. National Institute of Standards and Technology (USA)






8. Uninterruptible power supply






9. Identification and authentication






10. Constructive Cost Model






11. Network News Transfer Protocol






12. Mean time to repair






13. Storage area network






14. Computer-aided software engineering






15. Transport layer security






16. Just in time






17. Total cost of ownership






18. Software Process Improvement and Capability Determination






19. System development life cycle






20. Extended Binary-coded for Decimal Interchange Code






21. Business-to-government






22. IT Governance Institute






23. Conference on Data Systems Language






24. Point-to-point Protocol Over Ethernet






25. Trivial File Transport Protocol






26. Quality assurance






27. Relational database management system






28. Extensible Stylesheet Language






29. Virtual local area network






30. Plan-Do-Check-Act






31. Multiprotocol label switching






32. Indexed Sequential Access Method






33. Name Server Protocol or Network service provider






34. Electronic funds transfer






35. Artificial intelligence






36. Work breakdown structure






37. Basic Input/Output System






38. High-level data link control






39. Secured Hypertext Transmission Protocol






40. Capability Maturity Model Integration






41. Document image processing






42. Project Management Institute






43. Transaction processing (TP) monitors






44. System generation






45. Public key infrastructure






46. Demilitarized zone






47. User Datagram Protocol






48. Hardware/software






49. Network access point






50. Domain name server