Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Permanent virtual circuit






2. Secure Hypertext Transfer Protocol






3. Unified Modeling Language






4. Capability Maturity Model






5. Systems Control Audit Review File and Embedded Audit Modules






6. Network Time Protocol






7. Program change request






8. NT file system






9. Object Breakdown Structure






10. Link Control Protocol






11. IT service management






12. Quality assurance






13. New technology






14. Earned value analysis






15. American Standard Code for Information Interchange






16. Name Server Protocol or Network service provider






17. Routing Information Protocol






18. Entity relationship diagram






19. Write-once and read many






20. Single sign-on






21. Backbone network services






22. National Fire Protection Agency (USA)






23. Online Certificate Status Protocol






24. Decision support systems






25. Discrete Cosine Transform






26. Dynamic Host Configuration Protocol






27. Electromagnetic interference






28. Object request broker (ORB)






29. Reset






30. Data flow diagram






31. Common Object Request Broker Architecture






32. Network access point






33. Infrared






34. Internet Control Message Protocol






35. Internet relay chat






36. Biometric Information Management and Security






37. Fast Fourier Transform






38. Bypass label process






39. Programmable Read-Only Memory






40. Radio frequency identification






41. Group ID






42. Business-to-government






43. System generation






44. IS disaster recovery planning






45. Technical report






46. Business continuity planning






47. Encapsulating security payload






48. Disk management system






49. Personal computer/microcomputer






50. Orthogonal frequency division multiplexing