SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Single sign-on
UDP
CERT
MIS
SSO
2. Address Resolution Protocol
KGI
IRC
ARP
ROI
3. Supply Chain Operations Reference
ITU
CMDB
SCOR
IR
4. Key goal indicator
IPX
KGI
DSS
SYSGEN
5. High availability
HA
RAD
TACACS
IPF
6. Network interface card
HA
RDBMS
NIC
RFI
7. American National Standards Institute
ANSI
TMS
SOHO
CGI
8. Security parameter index
CCM
SPI
ISDN
FDDI
9. Compact disk-rewritable
FFT
BCM
CD-RW
CPS
10. Wi-Fi Protected Access
L2TP
WPA
SAS
NFPA
11. User acceptance testing
SOAP
BOM
UAT
MAP
12. Modulator/demodulator
MODEM
RFI
SBC
ITF
13. Bypass label process
URL
BLP
NT
BSC
14. Proof of possession
RST
SDO
CRL
POP
15. Intrusion prevention system
IPS
BCM
HTTP
VLAN
16. Supervisory Control and Data Acquisition
IDEF1X
SCADA
PPPoE
DIP
17. Data flow diagram
DFD
GUI
EVA
IRM
18. Unsolicited bulk e-mail
BIMS
SYSGEN
UBE
SNMP
19. Annual loss expectancy
CD
ALE
PHY
FC
20. Network file system
CIAC
NFS
SLIP
CAAT
21. Kilobit
X-to-X
BOM
Kb
SMTP
22. Secure Hypertext Transfer Protocol
S/HTTP
OO
SSH
TCP
23. Control Objectives for Information and related Technology
TMS
COBIT
SLIP
DLL
24. Direct access storage device
MAC address
TDM
RPC
DASD
25. High definition/high density-digital video disc
B-to-C
HD-DVD
DIP
DDN
26. Function point analysis
FPA
HW/SW
ARP
PER
27. Chief information security officer
CISO
TR
IDE
DCE
28. Closed-circuit television
CPU
GPS
VoIP
CCTV
29. Data-oriented system development
KLOC
KB
WLAN
DOSD
30. Computer Incident Advisory Capability
CIAC
CRC
DLL
CAD
31. Integrated test facility
Bit
NAT
ITF
DVD-HD
32. Demilitarized zone
SDO
CRM
RW
DMZ
33. Elliptical curve cryptography
ECC
SO
GUI
KGI
34. IT service management
VoIP
ITSM
DCE
SO
35. Constructive Cost Model
COCOMO2
PMI
EFT
RA
36. Object request broker (ORB)
ICT
PROM
ORB
SCARF/EAM
37. Manufacturing resources planning
MRP
IT
XSL
RADIUS
38. Internetwork Packet Exchange
IPX
DRP
SCOR
RDBMS
39. Balanced scorecard
SPI
DBMS
ASCII
BSC
40. Geographic information systems
GIS
DID
RDBMS
ACL
41. Extended Binary-coded for Decimal Interchange Code
EBCDIC
CERT
TDM
Xquery
42. Bill of materials processor
CERT
OBS
BOMP
ITF
43. World Wide Web
WWW
SDO
BRP
CSO
44. Digital Divide Network
FDM
DDN
HTML
URI
45. Fourth-generation language
4GL
WEP
WSDL
NCP
46. Point-to-Point Tunneling Protocol
UBE
PPTP
FRR
ITIL
47. Wireless wide area network
RPC
FRB
WWAN
BNS
48. Point of sale or Point-of-sale systems
MOS
OO
POS
ISAM
49. Frame relay assembler/disassembler
FRAD
SAN
DHCP
TLS
50. Remote method invocation
KB
WEP
TR
RMI