Test your basic knowledge |

CISM Certified Information Security Manager Acronyms

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Continuous and intermittent simulation






2. Set services identifiers






3. Data Encryption Standard






4. Direct-sequence spread spectrum (DSSS)






5. Transaction processing (TP) monitors






6. Global position system






7. Wi-Fi Protected Access






8. Switched virtual circuits






9. Critical Path Methodology






10. Program Evaluation Review Technique






11. Structured Query Language






12. Artificial intelligence






13. American National Standards Institute






14. Equal-error rate






15. Personal identification number






16. Control Objectives for Information and related Technology






17. Orthogonal frequency division multiplexing






18. Call Data Distribution Function






19. Recovery time objective






20. Graphical user interface






21. Management information system






22. Temporal Key Integrity Protocol






23. Direct access storage device






24. Incident response management






25. Compact disk






26. Data flow diagram






27. Integrated services digital network






28. Trivial File Transport Protocol






29. Computer-aided system engineering






30. Biometric Information Management and Security






31. Secure digital multimedia card






32. Point of sale or Point-of-sale systems






33. Universal resource locator






34. Layer 2 Tunneling Protocol






35. Security parameter index






36. Relational database management system






37. Common Object Request Broker Architecture






38. Projects in Controlled Environments 2






39. Network file system






40. Reset






41. Enterprise data flow architecture






42. Transport layer security






43. Public key infrastructure






44. Specific - measurable - achievable - relevant - time-bound






45. Security Association






46. Customer relationship management






47. Service delivery objective






48. Random access memory






49. Quality assurance testing






50. Object Breakdown Structure