Which of the following statements best describes the steps required to construct a custom security-based benchmark?
A) use the same assets and weighting for the benchmark
B) use representative assets and long run average weightings for the benchmark
C) use the same assets as the manager and the long run average weighting for the benchmark