SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Projects in Controlled Environments 2
PRINCE2
DSL
MAP
URI
2. Read-only memory
SMTP
RTO
POTS
ROM
3. Hardware/software
GID
DSS
HW/SW
TELNET
4. Estimates at completion
EAC
PERT
SOAP
FFT
5. Certificate revocation list
CRL
POP
FRB
CORBA
6. System development life cycle
ACL
SDLC
BLP
BSC
7. Public key infrastructure
CODASYL
DID
PKI
MPLS
8. Relational online analytical processing
TCO
PID
CIS
ROLAP
9. Extensible Authentication Protocol
MAC address
CAAT
GSM
EAP
10. Platform for Internet content selection
PICS
TCP/UDP
BCI
OECD
11. Source lines of code
OCSP
SLOC
TES
RPC
12. Transmission Control Protocol/Internet Protocol
EIGRP
HTTPS
CD
TCP/IP
13. Failure-to-enroll rate
FDDI
TCP
FER
RDBMS
14. Service level management
CAD
SLM
PMBOK
CMMI
15. Disaster recovery planning
FHSS
DRP
SYSGEN
FAR
16. Indexed Sequential Access Method
MOS
SCADA
ISAM
EAP
17. Specific - measurable - achievable - relevant - time-bound
ITF
OCSP
CSF
SMART
18. Emergency response time
DTR
CIS
EMRT
ROI
19. Maintenance out of service
DAT
MOS
B-to-G
OECD
20. Conference on Data Systems Language
SCM
IDEF1X
CODASYL
VPN
21. Closed-circuit television
DES
DFD
L2TP
CCTV
22. Integrated test facility
SOAP
ITF
TDM
SET
23. Elliptical curve cryptography
ORB
PR
PER
ECC
24. Digital Divide Network
WML
DDN
PKI
RPC
25. Terminal emulation software
TCP/UDP
SYSGEN
TES
CAD
26. Secure Hypertext Transfer Protocol
VPN
RMI
ISDN
S/HTTP
27. Identification and authentication
I&A
FAR
UDP
WLAN
28. Data dictionary/directory system
SBC
DD/DS
Bit
NFS
29. Service delivery objective
HTML
SDO
KLOC
B-to-B
30. Business impact analysis
CD-RW
FDDI
BIA
VLAN
31. Digital video disc
UBE
SSO
DVD
RAD
32. Network file system
FC
PID
TMS
NFS
33. Function point
FP
WEP
RAD
B-to-B
34. Data terminal ready
OSPF
RDBMS
NDA
DTR
35. Radio frequency identification
TACACS
SAN
RFID
DBMS
36. Decision support systems
Xquery
DSS
L2TP
B-to-G
37. Balanced scorecard
NIC
BSC
B-to-B
WEP
38. Remote Access Dial-in User Service
DNS
CSIRT
FEMA
RADIUS
39. Subject matter expert
SME
UML
PCR
URI
40. Switched virtual circuits
B-to-B
PICS
ASCII
SVC
41. The SANS Institute
SANS
ITT
UPS
ALU
42. Project Management Body of Knowledge
NAT
ICMP
OOSD
PMBOK
43. Set services identifiers
SSID
DRP
RBAC
SLA
44. Kilo lines of code
KLOC
DVD-HD
RW
IS
45. Digital video disc-high definition/high density
DVD
DVD-HD
DDoS
OSI
46. Web Services Description Language
WSDL
SVC
ITSM
ROM
47. Routing Information Protocol
CRC
RIP
NAP
SMF
48. Quality assurance
ROM
IETF
SLOC
QA
49. Advanced Encryption Standard
WLAN
AES
DFD
PER
50. Computer-integrated manufacturing
DDN
CIM
EC
GAS