FAQs about Internet Key Exchange Vulnerabilities