SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM Certified Information Security Manager Acronyms
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data communications equipment
IT
DCE
PC
ROM
2. Key goal indicator
DSS
Xquery
KGI
SDLC
3. Internet Security Association and Key Management Protocol/Oakley
RIP
ISAKMP/Oakley
MAC
KLOC
4. Mean time to repair
CSA
MTTR
CSO
IS/ORP
5. Bypass label process
RAS
IDEF1X
NSP
BLP
6. Extended Binary-coded for Decimal Interchange Code
CMM
EBCDIC
PERT
FFT
7. Unsolicited bulk e-mail
SD/MMC
SQL
UBE
NFPA
8. Online analytical processing
OLAP
SLA
IPF
MAN
9. Virtual local area network
VLAN
FFIEC
SLA
CISO
10. System development life cycle
MAN
SD/MMC
SDLC
MODEM
11. Kilobit
B-to-E
Kb
ROM
RAS
12. Wireless local area network
WLAN
WWAN
BIA
TCP/IP
13. Service level agreement
LCP
SLA
SD/MMC
ID
14. Redundant Array of Inexpensive Disks
NIC
POS
COM
RAID
15. Total cost of ownership
TCO
CERT
PER
RMI
16. Systems Control Audit Review File
WP
PERT
SCARF
SQL
17. Point-to-point Protocol
PPP
PMBOK
AH
RDBMS
18. Distributed computing environment
DCE
ROI
X-to-X
RMI
19. National Fire Protection Agency (USA)
RFI
NFPA
CICA
WBS
20. Microsoft's Transaction Server
CAM
SOHO
BIA
MTS
21. Network file system
PKI
NFS
FHSS
OCSP
22. Package-enabled reengineering
PER
CEO
ALE
CPM
23. Common Object Request Broker Architecture
CORBA
DMZ
MIS
DSS
24. Closed-circuit television
DECT
CCTV
PRINCE2
WORM
25. Conference on Data Systems Language
CODASYL
SOAP
CPO
FEMA
26. System management facility
ID
PER
MAP
SMF
27. Capability Maturity Model
OSPF
KPI
TR
CMM
28. Atomicity - consistency - isolation and durability
SSH
ACID
FAR
BCM
29. Function point
PDA
PKI
FP
EMI
30. Mean time between failures
ICMP
SSH
NCP
MTBF
31. Capability Maturity Model Integration
NT
CMMI
CDDF
RBAC
32. Role-based access control
PSTN
SMTP
DDoS
RBAC
33. Information Technology Infrastructure Library
VoIP
TCO
SPOOL
ITIL
34. Information technology
DNS
EMRT
IT
DHCP
35. Request for information
ANSI
PICS
RFI
ITU
36. Small office-home office
CRL
URN
TES
SOHO
37. Network interface card
POP
MAC address
NIC
SET
38. Plan-Do-Check-Act
HW/SW
PDCA
CIAC
POC
39. High availability
WBS
HA
FIPS
CASE
40. Reset
RST
L2TP
FP
EAM
41. Backbone network services
TES
BNS
KDSI
FIPS
42. Internet Engineering Task Force
OCSP
ECC
IETF
CSMA/CD
43. Kilo lines of code
CMMI
EDI
KLOC
EAM
44. Personal digital assistant
CIM
VLAN
PDA
FIPS
45. Private branch (business) exchange
XML
CIO
PBX
MAC
46. Document image processing
DIP
FPA
KB
EMI
47. User ID
EER
UID
CCM
COM
48. Digital video disc
RA
NAT
CRL
DVD
49. Source lines of code
SMART
SPOC
OOSD
SLOC
50. Program change request
POTS
DOSD
WPA
PCR