Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data communications equipment






2. Key goal indicator






3. Internet Security Association and Key Management Protocol/Oakley






4. Mean time to repair






5. Bypass label process






6. Extended Binary-coded for Decimal Interchange Code






7. Unsolicited bulk e-mail






8. Online analytical processing






9. Virtual local area network






10. System development life cycle






11. Kilobit






12. Wireless local area network






13. Service level agreement






14. Redundant Array of Inexpensive Disks






15. Total cost of ownership






16. Systems Control Audit Review File






17. Point-to-point Protocol






18. Distributed computing environment






19. National Fire Protection Agency (USA)






20. Microsoft's Transaction Server






21. Network file system






22. Package-enabled reengineering






23. Common Object Request Broker Architecture






24. Closed-circuit television






25. Conference on Data Systems Language






26. System management facility






27. Capability Maturity Model






28. Atomicity - consistency - isolation and durability






29. Function point






30. Mean time between failures






31. Capability Maturity Model Integration






32. Role-based access control






33. Information Technology Infrastructure Library






34. Information technology






35. Request for information






36. Small office-home office






37. Network interface card






38. Plan-Do-Check-Act






39. High availability






40. Reset






41. Backbone network services






42. Internet Engineering Task Force






43. Kilo lines of code






44. Personal digital assistant






45. Private branch (business) exchange






46. Document image processing






47. User ID






48. Digital video disc






49. Source lines of code






50. Program change request