Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Request for proposal






2. Frame relay assembler/disassembler






3. Computer-aided system engineering






4. Multiprotocol label switching






5. Dynamic link library






6. Compact disk






7. Global system for mobile communications






8. Application-specific integrated circuit






9. Wide area network






10. Exchange-to-Exchange






11. XML query






12. IS disaster recovery planning






13. Wireless local area network






14. Asynchronous Transfer Mode or automated teller machine






15. Information systems






16. Intellectual property rights






17. International Organization for Standardization






18. System generation






19. Remote access service






20. Computer-assisted audit technique






21. Routing Information Protocol






22. Internet relay chat






23. Internet protocol






24. Component Object Model/Distributed Component Object Model






25. Digital Divide Network






26. Biometric Information Management and Security






27. Program Evaluation Review Technique






28. Capability Maturity Model Integration






29. Return on investment






30. Intrusion detection system






31. Physical layer






32. Balanced scorecard






33. Compact disk-recordable






34. User Datagram Protocol






35. Computerized Numeric Control






36. Uniform resource identifier






37. Single point of contact






38. Supply Chain Management






39. Encapsulating security payload






40. Integrated development environment






41. Terminal Access Control Access Control System






42. Entity relationship diagram






43. Security officer






44. Identification






45. Voice-over Internet Protocol






46. Network Control Protocol






47. Enhanced Interior Gateway Routing Protocol






48. International Telecommunications Union






49. Information technology






50. Certification practice statement