SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remote Access Dial-in User Service
BI
PDA
PID
RADIUS
2. Universal Serial Bus
B-to-C
RFP
USB
DECT
3. Backbone network services
IDEF1X
MTBF
SOA
BNS
4. Random access memory
GUI
HDLC
S/HTTP
RAM
5. Registration authority
FEA
ESP
RA
SAN
6. Critical Path Methodology
CPM
KB
WORM
DMS
7. Plan-Do-Check-Act
SSO
PDCA
NTFS
DMZ
8. Remote procedure call
WPAN
COCOMO2
TLS
RPC
9. Thousand delivered source instructions
CSO
Xquery
KDSI
NNTP
10. Project Initiation Document
PID
CSA
DSSS
OBS
11. Time-division multiplexing
PBX
USB
NCP
TDM
12. Secured Hypertext Transmission Protocol
USB
ISAM
HTTPS
SCARF
13. Frequency-hopping spread spectrum
PCR
PAD
FHSS
IPSec
14. Earned value analysis
IP
S/HTTP
NSP
EVA
15. Internet Control Message Protocol
ITT
CD-RW
ITIL
ICMP
16. Role-based access control
WEP
RBAC
COM
CNC
17. Specific - measurable - achievable - relevant - time-bound
RAID
RMI
SMART
SANS
18. International Telecommunications Union
ITU
KLOC
BOM
WAP
19. Biometric Information Management and Security
SANS
BIMS
TCO
NIST
20. Data terminal ready
EDI
FRAD
DTR
SMF
21. Distributed denial of service
RPC
DDoS
RMI
PC
22. Kilobyte
KB
ASCII
AI
PBX
23. Exchange-to-Exchange
FC
CNC
CDPD
X-to-X
24. Enterprise architecture
AH
CIS
EA
DES
25. Supply Chain Operations Reference
SSH
OECD
RAID
SCOR
26. Network News Transfer Protocol
RFI
NNTP
I/O
MIS
27. Disaster Recovery Institute International
TDM
DRII
ROLAP
UML
28. File Transfer Protocol
FTP
I/O
SO
FP
29. Data warehouse
B-to-E
CSU-DSU
DW
RAS
30. Indexed Sequential Access Method
CD-RW
DRII
SET
ISAM
31. NT file system
ID
HTTP
CASE
NTFS
32. Recovery time objective
SSH
PPPoE
TKIP
RTO
33. IT Governance Institute
DECT
ESP
ITGI
SMART
34. Unified Modeling Language
NSP
UML
ITGI
EFT
35. Critical success factor
DID
CSF
FDM
DD/DS
36. Source lines of code
HTTP
SCARF/EAM
SLOC
CDDF
37. Name Server Protocol or Network service provider
SDLC
NSP
PPP
BCI
38. Estimates at completion
ERP
DIP
PRINCE2
EAC
39. Personal computer/microcomputer
SVC
CPO
PC
CPS
40. Computer-aided software engineering
SLM
DSS
CASE
PDCA
41. Intrusion prevention system
DDL
PR
BOM
IPS
42. Electronic commerce
EC
TKIP
CIM
PC
43. Emergency response time
RTO
CIS
CMMI
EMRT
44. High-level data link control
HDLC
DHCP
CCM
CICA
45. Simple Network Management Protocol
RADIUS
SNMP
DOSD
DTE
46. Business process reengineering
ITF
BPR
PVC
SCOR
47. Graphical user interface
DDoS
DAT
XML
GUI
48. User Datagram Protocol
RTO
CPO
ERD
UDP
49. Continuous and intermittent simulation
TKIP
RIP
DDN
CIS
50. Metropolitan area network
DVD
SSID
MAN
PDA