Question 2: Which of the following are examples of traffic that should be denied by an infrastructure ACL (iACL) to protect the network? (Choose 3) Checkbox: (choose correct answers): [ ] Traffic with source addresses from RFC 1918 address space [ ] Traffic with source addresses claiming to be from the internal management address space [ ] Fragments going to the management address space [ ] Traffic with destination port 80 [ ] Traffic with source addresses from public IP ranges Answer: Multiple Answers