Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 411 discussion

Actual exam question from ISC's CISSP
Question #: 411
Topic #: 1
[All CISSP Questions]

Which stage in the identity management (IdM) lifecycle constitutes the GREATEST risk for an enterprise if performed incorrectly?

  • A. Propagating
  • B. Deprovisioning
  • C. Provisioning
  • D. Maintaining
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jbell
Highly Voted 1 year, 7 months ago
Selected Answer: B
Employees more likely to have bad intentions when leaving compared to when joining company.
upvoted 6 times
deeden
3 months, 1 week ago
How about before leaving? ~snowden
upvoted 1 times
...
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
deeden
Most Recent 3 months, 1 week ago
Selected Answer: B
B and C should be in the same option with a slash (/) I don't love these types of questions LOL
upvoted 1 times
...
GPrep
10 months, 3 weeks ago
Selected Answer: C
Going with C - Both provisioning and deprovisioning play an important role in securing IT systems and applications, but effective and automated user provisioning should be top of mind for any organization that wants to enhance their security posture. https://www.okta.com/blog/2020/07/what-is-provisioning-and-deprovisioning/#:~:text=Both%20provisioning%20and%20deprovisioning%20play,to%20enhance%20their%20security%20posture.
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
B. Deprovisioning. Deprovisioning, also known as offboarding or deactivation, involves the process of revoking access and privileges for users who are leaving the organization or no longer need access to certain resources. If deprovisioning is not performed correctly or in a timely manner, it can pose significant security risks to an organization.
upvoted 1 times
...
InclusiveSTEAM
1 year, 1 month ago
B) Deprovisioning constitutes the greatest risk if performed incorrectly in the identity management lifecycle. Deprovisioning refers to revoking access and deleting accounts when someone leaves an organization. If accounts are not properly deprovisioned, it leaves the biggest risk of unauthorized access. Former employees may still be able to login and access resources if their accounts remain active. This can enable malicious actions by disgruntled former employees. Even without malicious intent, it exposes sensitive systems and data. The other stages have less severe risks if done improperly: A) Propagating refers to syncing identities across systems. Errors here may cause account inconsistencies but not direct unauthorized access. C) Provisioning done improperly may allow over-entitlement but not by itself open access to former staff. D) Maintaining refers to managing and updating access. Mistakes can lead to entitlement creep but not the same risks as improper deprovisioning.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
C can be a problem, but maybe I have too much access at work, I wouldn't even know it. B however can be a big issue. "In OneLogin’s survey, 20 percent of the respondents reported that failure to deprovision employees from corporate applications contributed to a data breach at their organization." "The impact for companies is huge: an average cost of a breach is $148 per record and $3.867.91 million per breach in the U.S. Breached companies underperform the market for years, and 60 percent of small businesses fold within six months of an attack." https://www.onelogin.com/blog/deprovisioning-secret
upvoted 1 times
...
[Removed]
1 year, 7 months ago
Selected Answer: B
I would go for B. CISSP OSG stated somewhere that an exit of employees goes with great risks (bad exit, etc). I think the risks here are greater than employees who get too much priviliges upfront.
upvoted 2 times
...
Rollingalx
1 year, 8 months ago
Selected Answer: B
B is correct. If access is not properly and timely revoked users who should no longer have access can continue to access sensitive data.
upvoted 3 times
...
sausageman
1 year, 8 months ago
Selected Answer: C
C - Provisioning
upvoted 1 times
...
Bodatiousbob
1 year, 8 months ago
Selected Answer: C
agreed with C
upvoted 2 times
...
Alex71
1 year, 8 months ago
Selected Answer: C
The correct answer is C. Provisioning. Provisioning is the process of creating user accounts and granting access to resources based on job roles or other criteria. This stage involves granting users access to resources they need to perform their duties, and it is where most of the access-related security risks lie. If provisioning is not done correctly, it can lead to users having excessive privileges, which can result in unauthorized access to sensitive information or systems. Therefore, provisioning needs to be carefully managed and monitored to ensure that users have only the necessary access to perform their job duties.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...