A developer is developing an application that uses signed requests (Signature Version 4) to call other AWS services. The developer has created a canonical request, has created the string to sign, and has calculated signing information.
Which methods could the developer use to complete a signed request? (Choose two.)
A. Add the signature to an HTTP header that is named Authorization
B. Add the signature to a session cookie
C. Add the signature to an HTTP header that is named Authentication
D. Add the signature to a query string parameter that is named X-Amz-Signature
E. Add the signature to an HTTP header that is named WWW-Authenticate
Which methods could the developer use to complete a signed request? (Choose two.)
A. Add the signature to an HTTP header that is named Authorization
B. Add the signature to a session cookie
C. Add the signature to an HTTP header that is named Authentication
D. Add the signature to a query string parameter that is named X-Amz-Signature
E. Add the signature to an HTTP header that is named WWW-Authenticate