The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, and Microsoft training courses free for a week.
Learn More ❯

Question 17:

Which of the following statements is true? Choose the best statement.

A. If the Internet Key Exchange (IKE) protocol is targeted by a denial-of-service attack, it responds by disabling itself until the denial-of-service attack lessens or stops.
B. If the Internet Key Exchange (IKE) protocol is targeted by a denial-of-service attack, it responds by attempting to preserve existing IPSec security associations (SAs), but dropping requests for new SAs until the denial-of-service attack lessens or stops.
C. If the Internet Key Exchange (IKE) protocol is targeted by a denial-of-service attack, it responds by attempting to permit requests for new SAs until the denial-of-service attack lessens or stops.
D. If the Internet Key Exchange (IKE) protocol is targeted by a denial-of-service attack, it responds by attempting to preserve existing IPSec security associations (SAs) until the denial-of-service attack lessens or stops.