Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Secure digital multimedia card






2. User Datagram Protocol






3. Data communications equipment






4. Internet Engineering Task Force






5. Estimates at completion






6. Switched virtual circuits






7. Embedded audit module






8. Certificate revocation list






9. Plain old telephone service






10. Incident response






11. Quality assurance testing






12. Federal Reserve Board (USA)






13. Program Evaluation Review Technique






14. Internet protocol






15. Business-to-government






16. Internet Security Association and Key Management Protocol/Oakley






17. Business recovery (or resumption) plan






18. Chief security officer






19. Address Resolution Protocol






20. Voice-over Internet Protocol






21. Control Objectives for Information and related Technology






22. Request for proposal






23. Data flow diagram






24. File Transfer Protocol






25. Maintenance out of service






26. Internet Control Message Protocol






27. Key goal indicator






28. Software Process Improvement and Capability Determination






29. Complimentary Code Keying






30. Project Initiation Document






31. Disaster Recovery Institute International






32. Atomicity - consistency - isolation and durability






33. Direct access storage device






34. Enterprise architecture






35. Electronic funds transfer






36. Public relations






37. Personal area network






38. Programmable Read-Only Memory






39. Virtual local area network






40. Remote Access Dial-in User Service






41. Computer Incident Advisory Capability






42. Digital video disc-high definition/high density






43. Bill of materials






44. Mandatory Access Control






45. Total cost of ownership






46. Artificial intelligence






47. False-rejection rate






48. Routing Information Protocol






49. Elliptical curve cryptography






50. Hypertext Transmission Protocol