Refer to the exhibit. An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?
A. Router 2 is the router receiving the DDoS attack.
B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
C. Router 1 is the trigger router in a RTBH implementation.
D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Yes, its C.
c : because R1 is the remote router triggering the RTBH implementation :
In this technique, the trigger router is used to set different BGP
community values and then send these values to its iBGP peers (BGP send-community) in its route update.
https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf