Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 60 discussion

Actual exam question from ISC's CISSP
Question #: 60
Topic #: 1
[All CISSP Questions]

Which of the following BEST describes centralized identity management?

  • A. Service providers perform as both the credential and identity provider (IdP).
  • B. Service providers identify an entity by behavior analysis versus an identification factor.
  • C. Service providers agree to integrate identity system recognition across organizational boundaries.
  • D. Service providers rely on a trusted third party (TTP) to provide requestors with both credentials and identifiers.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Marzie
Highly Voted 1 year, 7 months ago
Selected Answer: D
Yet another horrible question purely due to ambiguous wording. Centralized IAM doesn't have to be across org boundaries. Which puts me off C and leans me towards D, which I don't like much either tbh
upvoted 7 times
Jenkins3mol
6 months, 3 weeks ago
Yep, lots of horrible questions.
upvoted 1 times
...
...
Jamati
Highly Voted 2 years ago
Selected Answer: D
Centralized access control implies that a single entity (the IdP) performs all authorization verification. Decentralized access control (also known as distributed access control) implies that various entities perform authorization verification. The Identity Provider (IdP) is a third party that holds the user authentication and authorization information. Because centralized identity management is united across all applications, the user only needs to access one console to enable a variety of services and infrastructure. For example, a Service Provider such as a bank can use an IdP like provide customers with seamless access to banking services that are externally managed, like ordering checks, sending money through a cash app, or applying for a loan. If the customer updates their address in one application, it is updated in all applications.
upvoted 6 times
Ramye
6 months, 1 week ago
For the authentication the centralized is ideal as just need to know one ID ( use means of SSO) but for authorization it must be individual apps / services as each app/service would authorize based on needs. So debating Option A or D. Any confirmed answer would be appreciated. Thx
upvoted 1 times
...
Sledge_Hammer
1 year, 2 months ago
From your submission here, the answer is A.
upvoted 2 times
...
...
tejas07jain
Most Recent 2 days, 2 hours ago
Selected Answer: C
I think C is the right answer. CIM refers to the system where identity data and authentication are handled by a central authority, allowing multiple SPs to recognize and verify identities across different apps, platforms / organizations. It also aligns with Federated Identity management and SSO, where users / services (dispersed across org. boundaries) can authenticate once and get access to the services.
upvoted 1 times
...
nuggetbutts
2 weeks ago
Selected Answer: A
The answer is A - answer D refers to Federated Identity Management, which is not the same.
upvoted 1 times
...
deeden
3 months, 2 weeks ago
Selected Answer: C
Horrible... While both options C and D describe centralized identity management, they represent different implementation models. Key difference: Option C: Multiple service providers share a common identity repository. Option D: A trusted third party manages identity information and issues credentials. Federated Identity Management. Both models aim to achieve the same goal of providing a unified identity management solution across multiple systems and organizations.
upvoted 1 times
...
8e1c45b
3 months, 3 weeks ago
Selected Answer: A
Leaning towards A. This is what the OSG 10e says. Implementing Identity Management Identity management (IdM) implementation techniques generally fall into two categories: Centralized access control implies that a single entity within a system performs all authorization verification. Decentralized access control (also known as distributed access control) implies that various entities located throughout a system perform authorization verification. A small team or individual can manage centralized access control. Administrative overhead is lower because all changes are made in a single location, and a single change affects the entire system.
upvoted 2 times
...
Rachy
4 months, 1 week ago
Selected Answer: A
Let’s calm down and read the options. If it is centralized, it doesn’t need to rely on TPP to provide IAM. The best answer is A which is to one SP is serving as central authority to provide credentials and IDP
upvoted 1 times
...
Jenkins3mol
6 months, 3 weeks ago
Selected Answer: A
The most fitting description for centralized identity management would be: A. Service providers perform as both the credential and identity provider (IdP). This option accurately portrays the concept of centralized identity management, where a single entity (the service provider) is responsible for both providing credentials (such as usernames and passwords) and verifying identities. This centralization streamlines the authentication process and enhances security by consolidating identity-related functions.
upvoted 2 times
...
Hardrvkllr
7 months, 1 week ago
Selected Answer: A
I though it was D, but copilot states the answer is A Centralized identity management is best described by option A: Service providers perform as both the credential and identity provider (IdP). In this model, a single authority (the service provider) is responsible for maintaining and managing the identities and access controls for all users within the system. This central authority acts as the identity provider (IdP), issuing credentials and managing user identities. This approach simplifies administration and improves security by providing a single point of control. However, it can also create a single point of failure and may not scale well for large, distributed systems. Options B, C, and D describe different aspects of identity management but do not accurately define centralized identity management.
upvoted 1 times
...
eboehm
7 months, 2 weeks ago
Selected Answer: A
wow soooo many wrong answers here. There is NO mention of federated identities in the question. Centralized just means you are using something like active directly for authentication where decentralized would be a peer-to-peer environment where authentication is handled locally on each system. Dont add extra context to what the question is asking!
upvoted 2 times
...
AshStevens
7 months, 3 weeks ago
Selected Answer: D
"C" describes federated identity management, where organizations agree to share identity system recognition across their boundaries. Textbook definitions - that isn't centralised! Consider the danger of blanket statements - if there are any centralised management systems where multiple service providers don't integrate across boundaries, then the answer is too specific to be true. That leaves A or D to fill in the role of Centralised access - however the service provider would not typically be the one doing this in all cases. D fits the bill.
upvoted 1 times
...
john_boogieman
8 months, 1 week ago
Selected Answer: D
"Service providers agree to integrate identity system recognition across organizational boundaries" describes a form of federated identity management, not a centralized identity management.
upvoted 1 times
...
homeysl
8 months, 1 week ago
Selected Answer: C
Check SAML and OAuth
upvoted 1 times
...
Soleandheel
11 months, 3 weeks ago
Guys stop getting misled by chatgpt. The correct answer here is C. Chatgpt will tell you confidently that it's D but it's incorrect. You have to challenge chatgpt because it tends to give flawed answers. When provided more information from the CISSP official study guide, it changed it's answer to C. and apologized. Please be careful with chatgpt. Use it wisely by doing your own research as well.
upvoted 1 times
...
thanhlb
1 year ago
Selected Answer: A
C describes federated identity management D describes delegated identity management A is best choice
upvoted 1 times
...
noh_ssiw_l
1 year, 2 months ago
Selected Answer: C
The key is "BEST" describe and don't add your own context!! and C.Service providers agree to integrate identity system recognition "ACROSS" organizational boundaries
upvoted 2 times
...
Sledge_Hammer
1 year, 2 months ago
The correct answer should be A. In a centralized identity management system, data is stored and managed by a central authority or service provider who typically maintains a central repository or database where user identity information is stored.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...