nerdexam
(ISC)2(ISC)2

CISSP · Question #1024

CISSP Question #1024: Real Exam Question with Answer & Explanation

The correct answer is B: Implement identity and access management (IAM) platform.. Implementing an identity and access management (IAM) platform is the option that is most likely to resolve the issues associated with user access. IAM is a framework that defines and manages the identities and access rights of the users and entities in an organization, such as th

Submitted by fernanda_arg· Mar 5, 2026Identity and Access Management (IAM)

Question

A large organization's human resources and security teams are planning on implementing technology to eliminate manual user access reviews and improve compliance. Which of the following options is MOST likely to resolve the issues associated with user access?

Options

  • AImplement a role-based access control (RBAC) system.
  • BImplement identity and access management (IAM) platform.
  • CImplement a Privileged Access Management (PAM) system.
  • DImplement a single sign-on (SSO) platform.

Explanation

Implementing an identity and access management (IAM) platform is the option that is most likely to resolve the issues associated with user access. IAM is a framework that defines and manages the identities and access rights of the users and entities in an organization, such as the employees, contractors, customers, partners, or devices. IAM can help to eliminate manual user access reviews and improve compliance by providing features and functions such as: Identity lifecycle management, which automates the processes of creating, updating, suspending, or deleting the user accounts and credentials, based on the user roles, attributes, or events. Access management, which enforces the policies and rules for granting, revoking, or modifying the user access rights and permissions to the resources and services, based on the user roles, attributes, or events. Authentication, which verifies the identity of the users or entities that are trying to access the resources or services, using methods such as passwords, tokens, biometrics, or multifactor Authorization, which determines the level and scope of the user access rights and permissions to the resources or services, based on the user roles, attributes, or events. Auditing and reporting, which monitors and records the user access activities and events, and generates the reports and logs for analysis, review, or compliance purposes.

Topics

#Identity and Access Management (IAM)#User access review#Compliance#RBAC

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions