Why are all providers of Internet connectivity urged to implement the filtering described in RFC
2827?
A.
to stop internal users from reaching web sites that violate the established security policy
B.
to prohibit attackers from using source addresses that reside within a range of legitimately
advertised prefixes
C.
to filter Java applications that come from a source that is not trusted
D.
to prohibit attackers from using forged source addresses that do not reside within a range of
legitimately advertised prefixes