Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Service level management






2. Chief information officer






3. Maintenance out of service






4. Enterprise java beans






5. Total cost of ownership






6. NT file system






7. Enterprise application integration






8. Business intelligence






9. Artificial intelligence






10. Private branch (business) exchange






11. Read-only memory






12. Universal resource locator






13. Network address translation






14. Single point of contact






15. Bypass label process






16. Internet Security Association and Key Management Protocol/Oakley






17. Unified Modeling Language






18. Universal Serial Bus






19. Orthogonal frequency division multiplexing






20. Intrusion prevention system






21. Manufacturing resources planning






22. Small office-home office






23. Voice-over Internet Protocol






24. Hardware/software






25. Information technology






26. The SANS Institute






27. American National Standards Institute






28. Public switched telephone network






29. Equal-error rate






30. User Datagram Protocol






31. Thousand delivered source instructions






32. Computer-assisted design






33. Certificate authority






34. Terminal emulation software






35. Systems network architecture






36. Personal identification number






37. Extended Binary-coded for Decimal Interchange Code






38. Public key infrastructure






39. IS disaster recovery planning






40. Incident response






41. Component Object Model/Distributed Component Object Model






42. System development life cycle






43. Point-to-Point Tunneling Protocol






44. Carrier-sense Multiple Access/Collision Detection






45. Remote access service






46. Software Process Improvement and Capability Determination






47. Enhanced Interior Gateway Routing Protocol






48. Point-to-point Protocol






49. Program Evaluation Review Technique






50. System management facility