<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with this question in CISSP Study Group</title>
    <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83693#M2098</link>
    <description>&lt;P&gt;Not a great question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose the value in it is that it is asking you to identify common terms used in identity and access management, but these are three very different things.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;X.500 is a superset of standards for directories and related certificates. Yes, you can have X.500-based things (services, certificates, applications, etc.) that store identity info, but to just call X.500 an "identity store" is a stretch.&lt;/LI&gt;&lt;LI&gt;LDAP could be thought of as a scaled-down version of X.500. It is, too, just a protocol (that's what the P stands for after all). While you have LDAP servers etc., it seems incorrect to just say LDAP means some actual identity store.&lt;/LI&gt;&lt;LI&gt;Kerberos is another protocol, used for network authentication. It basically serves as the linchpin among all these things on a network trying to interact. You have kerberos enabled devices all over and, and kerberos (specifically the key distribution center "KDC") acts like a third party they all trust. The KDC will talk to something like an LDAP server (or Active Directory) so it can authenticate a user/client and then tell some other device (via what's called a ticket) that the user/client was authenticated. A critical distinction about kerberos is that it doesn't provide authorization (that's up to the other devices or some other middleware).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I'm not sure the exam you are studying for, but two things:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;BR /&gt;Test prep questions aren't written by test writers typically. Especially with the ISC2 exams, there's a separation between test developers and even the official ISC2 instructional content. If you end up with a question that is confusing to you, more than likely it was written by someone who didn't fully understand the content. Just move on.&lt;/LI&gt;&lt;LI&gt;Don't rely on question taking/apps to learn content. This is a generational thing, but people think, "I can learn content based on the feedback of questions I answer right and wrong." That doesn't work well with security. Focus on trying to gain experience with the stuff that you don't understand. Hands-on work teaches better than anything, but short of that, read an in-depth explanation of these technologies, not just an AI summary. This way, when you encounter challenging questions, you'll be in a much better position to know them out.&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Mon, 08 Sep 2025 11:50:13 GMT</pubDate>
    <dc:creator>JoePete</dc:creator>
    <dc:date>2025-09-08T11:50:13Z</dc:date>
    <item>
      <title>Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83656#M2094</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VibeCoder_0-1757257151719.png" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/10168i004B5E925434B9DD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="VibeCoder_0-1757257151719.png" alt="VibeCoder_0-1757257151719.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was unsure where to seek clarification regarding the explanation, so I decided to post my question here.&lt;/P&gt;&lt;P&gt;I selected LDAP and X.500 as my answers; however, it appears that all three options are considered correct. Could someone please clarify whether Kerberos is an example of an identity store?&lt;/P&gt;</description>
      <pubDate>Sun, 07 Sep 2025 15:07:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83656#M2094</guid>
      <dc:creator>VibeCoder</dc:creator>
      <dc:date>2025-09-07T15:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83671#M2095</link>
      <description>&lt;P&gt;literary none of them are identity store (it could be "LDAP store" but only X.500, Kerberos or LDAP as is it's only protocol for query database (X.500 and LDAP) or authenticate, but it do not contain elements of identity.&amp;nbsp;&lt;BR /&gt;It's hard to guess what autors of that question have in mind...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Sep 2025 20:24:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83671#M2095</guid>
      <dc:creator>ziembor</dc:creator>
      <dc:date>2025-09-07T20:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83678#M2096</link>
      <description>&lt;P&gt;LDAP is x.500 based, and LDAP/AD uses Kerberos as its authentication engine.&amp;nbsp; Conversely Kerberos uses a directory for its database.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the key here for this question is if we abstract the user identity to being just the Ticket Granting Ticket (Gold Ticket), Kerberos is a store for the relationship to the service tickets (Silver Ticket) effectively making it an Identity store in this context of the question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 02:07:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83678#M2096</guid>
      <dc:creator>MurrayMartin</dc:creator>
      <dc:date>2025-09-08T02:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83693#M2098</link>
      <description>&lt;P&gt;Not a great question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose the value in it is that it is asking you to identify common terms used in identity and access management, but these are three very different things.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;X.500 is a superset of standards for directories and related certificates. Yes, you can have X.500-based things (services, certificates, applications, etc.) that store identity info, but to just call X.500 an "identity store" is a stretch.&lt;/LI&gt;&lt;LI&gt;LDAP could be thought of as a scaled-down version of X.500. It is, too, just a protocol (that's what the P stands for after all). While you have LDAP servers etc., it seems incorrect to just say LDAP means some actual identity store.&lt;/LI&gt;&lt;LI&gt;Kerberos is another protocol, used for network authentication. It basically serves as the linchpin among all these things on a network trying to interact. You have kerberos enabled devices all over and, and kerberos (specifically the key distribution center "KDC") acts like a third party they all trust. The KDC will talk to something like an LDAP server (or Active Directory) so it can authenticate a user/client and then tell some other device (via what's called a ticket) that the user/client was authenticated. A critical distinction about kerberos is that it doesn't provide authorization (that's up to the other devices or some other middleware).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I'm not sure the exam you are studying for, but two things:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;BR /&gt;Test prep questions aren't written by test writers typically. Especially with the ISC2 exams, there's a separation between test developers and even the official ISC2 instructional content. If you end up with a question that is confusing to you, more than likely it was written by someone who didn't fully understand the content. Just move on.&lt;/LI&gt;&lt;LI&gt;Don't rely on question taking/apps to learn content. This is a generational thing, but people think, "I can learn content based on the feedback of questions I answer right and wrong." That doesn't work well with security. Focus on trying to gain experience with the stuff that you don't understand. Hands-on work teaches better than anything, but short of that, read an in-depth explanation of these technologies, not just an AI summary. This way, when you encounter challenging questions, you'll be in a much better position to know them out.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 08 Sep 2025 11:50:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83693#M2098</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2025-09-08T11:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83719#M2099</link>
      <description>&lt;P&gt;Hopefully this might help:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An identify store is a&amp;nbsp;generic concept — it is essentialy a repository (database, directory, or service) where digital &lt;U&gt;identities&lt;/U&gt; (users, groups, devices, service accounts, etc.) are stored and managed.&amp;nbsp; For example- Active Directory (Microsoft), Azure AD / Entra ID, Okta, Ping, Auth or a &amp;nbsp;simple SQL user table in an app.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;X.500 is an international standard created in 1980s used for electronic digital &lt;U&gt;services&lt;/U&gt; used like a corporate phone book and LDAP is a light weight version of X.500 created in 1990s so that it could use TCPIP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 18:48:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/83719#M2099</guid>
      <dc:creator>helenpizzie</dc:creator>
      <dc:date>2025-09-08T18:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with this question</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/85088#M2171</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/606071599"&gt;@VibeCoder&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This question a bit confusing.&amp;nbsp; actually Kerberos is protocol which use identity store to authenticate. But here they are referring that it contains authentication data.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2025 17:06:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Need-help-with-this-question/m-p/85088#M2171</guid>
      <dc:creator>viralJosee</dc:creator>
      <dc:date>2025-10-27T17:06:25Z</dc:date>
    </item>
  </channel>
</rss>

