A. Router 2 is the router receiving the DDoS attack.
B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
C. Router 1 is the trigger router in a RTBH implementation.
D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.