New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 26 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 26
Topic #: 6
[All CISSP Questions]

Which of the following BEST describes the standard used to exchange authorization information between different identity management systems?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Jenelle
4 months ago
Wait, WAP? Really? I didn't think that was still relevant!
upvoted 0 times
...
Tarra
4 months ago
SAML is the right answer, no doubt about it!
upvoted 0 times
...
Kara
4 months ago
XML is just for data formatting, not specifically for auth.
upvoted 0 times
...
Terry
4 months ago
I thought it was SOA? Seems like a better fit.
upvoted 0 times
...
Diego
5 months ago
Definitely SAML, it's the go-to for authorization info.
upvoted 0 times
...
Thea
5 months ago
WAP seems out of place here; I don't recall it being relevant to identity management at all. SAML feels more accurate.
upvoted 0 times
...
Ricki
5 months ago
I feel like SOA was mentioned in relation to system architecture, but I don't think it deals specifically with authorization info.
upvoted 0 times
...
William
5 months ago
I'm not entirely sure, but I remember something about XML being used for data exchange. Could it be that?
upvoted 0 times
...
Mariko
5 months ago
I think SAML is the right answer since we covered it in class as a way to handle authentication across different systems.
upvoted 0 times
...
Kayleigh
5 months ago
I'm pretty confident the SATA SSD is the best choice here. It's a good balance of speed and compatibility.
upvoted 0 times
...
Eun
5 months ago
Hmm, this is a tricky one. I'm not entirely sure which option would be best for identifying influential observations in a multiple regression model. I may need to do some additional research on the different diagnostic methods available in SAS.
upvoted 0 times
...
Tegan
5 months ago
Okay, let me see... I know k-anonymity is about protecting individual privacy, but I'm not sure if that's the right approach for this scenario. I'll have to review my notes.
upvoted 0 times
...

Save Cancel