New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CCSP Exam - Topic 2 Question 69 Discussion

Actual exam question for ISC2's CCSP exam
Question #: 69
Topic #: 2
[All CCSP Questions]

What provides the information to an application to make decisions about the authorization level appropriate when granting access?

Show Suggested Answer Hide Answer
Suggested Answer: D

According to ''The NIST Definition of Cloud Computing,'' in SaaS, ''The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based e-mail), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.''


Contribute your Thoughts:

0/2000 characters
Tu
3 months ago
Just to clarify, does the User have any say in this?
upvoted 0 times
...
Jordan
3 months ago
I thought Federation played a bigger role in this.
upvoted 0 times
...
Mozell
3 months ago
Wait, are we sure it's not the Relying party?
upvoted 0 times
...
Tran
4 months ago
I agree, the Identity Provider is key for authorization levels.
upvoted 0 times
...
Ardella
4 months ago
It's definitely the Identity Provider that gives that info.
upvoted 0 times
...
Tegan
4 months ago
Federation sounds familiar, but I can't recall if it directly relates to authorization levels. I might lean towards D as well.
upvoted 0 times
...
Nenita
4 months ago
I feel like I read that the user is involved in the process, but I don't think they provide the information directly.
upvoted 0 times
...
Lea
4 months ago
I'm not entirely sure, but I remember something about relying parties in a similar practice question. Could it be B?
upvoted 0 times
...
Markus
5 months ago
I think the answer might be D, Identity Provider, since it usually handles user authentication and provides info for access decisions.
upvoted 0 times
...
Marg
5 months ago
The key here is that the question is asking what the employer CANNOT collect. I think the answer is C, since information about an individual's children doesn't seem relevant for pre-employment.
upvoted 0 times
...
Desmond
5 months ago
This kinda reminds me of a practice test question where I had to verify port configurations. Maybe it's related to a trunk or access port issue?
upvoted 0 times
...
Tamesha
5 months ago
Okay, I've got this. The answer is definitely D - Prepare individual envelopes. That's the only way to ensure each person gets their own personalized envelope, which is important for a professional mailing like this.
upvoted 0 times
...
Loise
5 months ago
I have some doubts about EWQR. I feel like I might have overlooked its effectiveness during my studies.
upvoted 0 times
...
Norah
5 months ago
Okay, let's see. The key is understanding how database shadowing works in AACC HA. I think I can work this out.
upvoted 0 times
...
Charisse
9 months ago
Hold up, is this a trick question? I bet the answer is 'All of the above'.
upvoted 0 times
...
Jamal
9 months ago
The Identity Provider, definitely. Unless you're living in the Matrix, that is.
upvoted 0 times
...
Solange
9 months ago
User, duh. They're the ones who need access, aren't they?
upvoted 0 times
Shad
8 months ago
I think it's a combination of both the User and the Identity Provider working together.
upvoted 0 times
...
Hassie
8 months ago
True, the Identity Provider does provide information for authorization decisions.
upvoted 0 times
...
Kendra
8 months ago
But what about the Identity Provider? They play a role in granting access too.
upvoted 0 times
...
Jaclyn
8 months ago
User, of course. They are the ones who need access.
upvoted 0 times
...
...
Jessenia
10 months ago
Hmm, I think it's the Federation. Gotta love those identity management protocols!
upvoted 0 times
Alayna
8 months ago
I'm pretty sure it's the Relying party.
upvoted 0 times
...
Elke
8 months ago
I believe it's the Identity Provider.
upvoted 0 times
...
Ronny
9 months ago
I think it's the Federation.
upvoted 0 times
...
...
Wilbert
10 months ago
I'm not sure, but I think it could also be C) Federation because it involves multiple parties sharing information.
upvoted 0 times
...
Brigette
11 months ago
Identity Provider, of course! That's where the authorization info comes from.
upvoted 0 times
Naomi
10 months ago
Got it. Thanks for clarifying!
upvoted 0 times
...
Michael
10 months ago
Yes, that's correct. The Identity Provider supplies the necessary information for access decisions.
upvoted 0 times
...
Aron
10 months ago
So, the application gets the authorization level from the Identity Provider?
upvoted 0 times
...
Shonda
10 months ago
Identity Provider is the one that provides the authorization info.
upvoted 0 times
...
...
Kayleigh
11 months ago
I agree with Natalya. The Identity Provider provides the necessary information for authorization.
upvoted 0 times
...
Natalya
11 months ago
I think the answer is D) Identity Provider because it verifies the user's identity.
upvoted 0 times
...

Save Cancel