Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Session border controller






2. Point-to-point Protocol






3. Enterprise architecture






4. Disk management system






5. Information Technology Infrastructure Library






6. Management information system






7. Remote Access Dial-in User Service






8. Private branch (business) exchange






9. Component Object Model






10. Internet protocol






11. Supply Chain Operations Reference






12. Manufacturing resources planning






13. Enterprise resource planning






14. Call Data Distribution Function






15. Data Definition Language






16. Exchange-to-Exchange






17. Security Association






18. Serial Line Internet Protocol






19. Network access point






20. Supervisory Control and Data Acquisition






21. Distributed denial of service






22. Digital video disc






23. Quality assurance testing






24. Transaction processing (TP) monitors






25. Internetwork Packet Exchange






26. Wired Equivalent Privacy






27. Technical report






28. Discrete Cosine Transform






29. Integrated test facility






30. Computer-aided software engineering






31. Domain name server






32. Infrared






33. Proof of concept






34. Equal-error rate






35. Computer-assisted design






36. Secure electronic transactions






37. Identification and authentication






38. Request for proposal






39. Radio frequency






40. Extensible Stylesheet Language






41. Configuration management database






42. IP Security






43. Function point






44. Role-based access control






45. Mean time to repair






46. IT service management






47. Federal Reserve Board (USA)






48. Cyclic redundancy check






49. Group ID






50. Biometric Information Management and Security