SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Request for proposal
TACACS
RFP
SO
RF
2. Frame relay assembler/disassembler
CPO
CSMA/CD
FRAD
DoS
3. Computer-aided system engineering
RPO
CAM
CASE
SAS
4. Multiprotocol label switching
DID
MPLS
POC
FIPS
5. Dynamic link library
GID
DLL
OOSD
EJB
6. Compact disk
OECD
CD
CASE
FEMA
7. Global system for mobile communications
DMS
X-to-X
GSM
Xquery
8. Application-specific integrated circuit
NAT
SIC
MAC address
EDFA
9. Wide area network
WAN
ALU
PID
COOP
10. Exchange-to-Exchange
CMMI
VPN
X-to-X
DTR
11. XML query
WWAN
JIT
TELNET
Xquery
12. IS disaster recovery planning
M&A
DoS
PPPoE
IS/ORP
13. Wireless local area network
WLAN
L2TP
DSL
HA
14. Asynchronous Transfer Mode or automated teller machine
SANS
ATM
VoIP
BIA
15. Information systems
IS
PRD
CSIRT
MAC address
16. Intellectual property rights
IPRs
DD/DS
POTS
GSM
17. International Organization for Standardization
WSDL
SLA
SPI
ISO
18. System generation
HD-DVD
DID
UML
SYSGEN
19. Remote access service
RAS
PRINCE2
FAR
ERP
20. Computer-assisted audit technique
WML
CAAT
L2TP
DTR
21. Routing Information Protocol
DID
DAC
RIP
WPAN
22. Internet relay chat
IRC
QAT
HIPO
TP monitors
23. Internet protocol
OS
ISAM
RFID
IP
24. Component Object Model/Distributed Component Object Model
AH
COM/DCOM
RA
MTS
25. Digital Divide Network
SOAP
FRAD
DDN
MOS
26. Biometric Information Management and Security
BIMS
ITSM
OEP
SMTP
27. Program Evaluation Review Technique
HTTPS
NAS
ACL
PERT
28. Capability Maturity Model Integration
IDS
EJB
DMS
CMMI
29. Return on investment
ALE
PC
ROI
EAM
30. Intrusion detection system
IDS
DHCP
PSTN
RMI
31. Physical layer
SA
ISDN
DES
PHY
32. Balanced scorecard
BIA
BSC
IS/ORP
LCP
33. Compact disk-recordable
CD-R
DAC
IPRs
NIC
34. User Datagram Protocol
XML
UDP
CoS
ALE
35. Computerized Numeric Control
COBIT
SCOR
CNC
DOSD
36. Uniform resource identifier
BI
FDM
B-to-E
URI
37. Single point of contact
SPOC
RBAC
4GL
NAP
38. Supply Chain Management
EAC
SCM
ISO
RAM
39. Encapsulating security payload
ESP
TACACS
SD/MMC
WP
40. Integrated development environment
IDE
L2TP
DSL
RAID
41. Terminal Access Control Access Control System
SLM
CPU
SPOC
TACACS
42. Entity relationship diagram
RADIUS
ERD
NTFS
FTP
43. Security officer
SO
DNS
PBX
XBRL
44. Identification
MAC address
ID
RMI
DMS
45. Voice-over Internet Protocol
WWAN
CPU
CAM
VoIP
46. Network Control Protocol
ITSM
NCP
WBS
EAP
47. Enhanced Interior Gateway Routing Protocol
NTFS
EAP
DSL
EIGRP
48. International Telecommunications Union
POC
ATM
ITU
SNA
49. Information technology
POS
IT
SAN
DTE
50. Certification practice statement
CPS
MAN
OSPF
ISO