Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Proof of concept






2. Manufacturing resources planning






3. Chief information security officer






4. Simple Mail Transport Protocol






5. Emergency response time






6. Virtual local area network






7. Data Encryption Standard






8. Object Breakdown Structure






9. Input/output






10. File allocation table






11. Constructive Cost Model






12. Modulator/demodulator






13. Remote Access Dial-in User Service






14. Incident response






15. Point-to-point Protocol Over Ethernet






16. Continuity of operations plan






17. Serial Line Internet Protocol






18. Canadian Institute of Chartered Accountants






19. Remote access service






20. Federal Emergency Management Association (USA)






21. Domain name server






22. Gigabyte






23. Dynamic link library






24. Common gateway interface






25. Enterprise data flow architecture






26. Federal Energy Regulatory Commission (USA)






27. Enterprise application integration






28. Source lines of code






29. System management facility






30. Data flow diagram






31. Physical layer






32. Transmission Control Protocol/User Datagram Protocol






33. Computer-aided manufacturing






34. Media Access Control address






35. Component Object Model/Distributed Component Object Model






36. Internet service provider






37. Securities and Exchange Commission (USA)






38. User acceptance testing






39. World Wide Web






40. Registration authority






41. Wired Equivalent Privacy






42. Network Control Protocol






43. System development life cycle






44. Redundant Array of Inexpensive Disks






45. Link Control Protocol






46. Earned value analysis






47. Critical success factor






48. Bill of materials processor






49. Work breakdown structure






50. Universal Serial Bus