exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 178 discussion

Actual exam question from ISC's CCSP
Question #: 178
Topic #: 1
[All CCSP Questions]

Where is an XML firewall most commonly deployed in the environment?

  • A. Between the application and data layers
  • B. Between the IPS and firewall
  • C. Between the presentation and application layers
  • D. Between the firewall and application server
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Lenell
Highly Voted 2 years, 3 months ago
Selected Answer: D
XML Firewall is an appliance so A and C are eliminated. XML is an application of interest. D places the appliance in the most applicable location in the topology.
upvoted 5 times
...
Monchel
Most Recent 1 month, 2 weeks ago
Selected Answer: D
The suggestion to put an XML firewall “between the presentation and application layers” (Option C) is not correct. An XML firewall is a network security device, not something that sits between internal software layers of an application. The CCSP guidance explicitly notes that placing an XML firewall at other points (such as between the presentation and application layers, or between an IPS and the firewall, etc.) “would not serve the intended purpose” of intercepting XML attacks​. The proper location is in front of the application server (behind the external firewall), so that all XML traffic can be filtered before it hits the application​. This aligns with best practices for web services security and is the placement recommended by the CCSP curriculum and other authoritative sources.
upvoted 1 times
...
MaciekMT
1 month, 4 weeks ago
Selected Answer: D
XML firewalls are specialized appliances that inspect and filter XML-based traffic—such as SOAP messages—in order to detect and block malicious XML content and attacks. They are most commonly deployed as a reverse proxy between the external firewall and the application server. This placement allows them to examine inbound XML traffic before it reaches the application server, thereby providing an additional layer of protection for XML-based web services.
upvoted 1 times
...
Sivath
4 months, 4 weeks ago
Between the firewall and application server.
upvoted 1 times
...
sweetykaur
6 months ago
Between the firewall and application server. This placement helps in filtering and securing XML-based communications before they reach the application server.
upvoted 3 times
...
Mo22
12 months ago
Selected Answer: C
An XML firewall is designed to manage and secure XML traffic, which is commonly associated with web services and API interactions. The most appropriate deployment for an XML firewall is C
upvoted 1 times
...
Pika26
1 year, 12 months ago
Selected Answer: C
C. Between the presentation and application layers
upvoted 2 times
Pika26
1 year, 11 months ago
REMOVE.
upvoted 1 times
...
...
DA95
2 years, 4 months ago
Selected Answer: C
A web application firewall (WAF - protected behind XML and SQL injection) is typically placed between the application and the presentation layers of the OSI (Open Systems Interconnection) model. The OSI model is a framework that is used to describe how data is transmitted over a network. It is divided into seven layers, each of which performs a specific set of functions to enable communication between devices.
upvoted 3 times
...
Zeezee2
3 years, 5 months ago
For reference, an XML firewall is a specialized device used to protect applications exposed through XML based interfaces like REST and scan XML traffic coming into and going out from an organization. Typically deployed in a DMZ environment an XML Firewall is often used to validate XML traffic, control access to XML based resources, filter XML content and rate limit requests to back-end applications exposed through XML based interfaces.
upvoted 3 times
...
Zeezee2
3 years, 5 months ago
You can't put a solution like XML firewall in the theoretical space between layer 6 & 7 of OSI model, it doesn't make sense
upvoted 4 times
...
Banzaaai
3 years, 6 months ago
why not C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago