An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users and CloudFront, and all traffic between CloudFront and the web application.
How can these requirements be met? (Choose two.)
A. Use AWS KMS to encrypt traffic between CloudFront and the web application.
B. Set the Origin Protocol Policy to “HTTPS Only”.
C. Set the Origin’s HTTP Port to 443.
D. Set the Viewer Protocol Policy to “HTTPS Only” or “Redirect HTTP to HTTPS”.
E. Enable the CloudFront option Restrict Viewer Access.
How can these requirements be met? (Choose two.)
A. Use AWS KMS to encrypt traffic between CloudFront and the web application.
B. Set the Origin Protocol Policy to “HTTPS Only”.
C. Set the Origin’s HTTP Port to 443.
D. Set the Viewer Protocol Policy to “HTTPS Only” or “Redirect HTTP to HTTPS”.
E. Enable the CloudFront option Restrict Viewer Access.