AWS Certified Security – Specialty SCS-C01 – Question325

A company is running third-party WAF software on AWS. The company's security team discovers that the third-party WAF software has vulnerabilities that can lead to server-side request forgery (SSRF) attacks.
Because of this discovery, the security team mandates that the entire AWS infrastructure must use version 2 of the instance metadata service (IMDSv2).
At the planned completion of the implementation of IMDSv2, the security team uses the Amazon CloudWatch metric Amazon EC2:MetadataNoToken and determines that hundreds of old IMDSv1 requests still are occurring each day. The security team is willing to risk the availability of the company's application to finish this implementation.
Which combination of steps should the security team take to complete the migration to IMDSv2 in the AWS environment? (Choose two.)

A.
Write and enforce an IAM policy that denies the ec2:runinstances action when the ec2:MetadataHttpTokens condition key is not set to required.
B. Use the ec2 modify-instance-metadata-options command from the AWS CLI with the http-put-response- hop-limit 0 option.
C. Use the ec2 modify-instance-metadata-options command from the AWS CLI with the –http-tokens required option.
D. Modify instance security groups to deny all outbound HTTP traffic to 169.254.169.254.
E. From each of the AWS account EC2 instances run the following command: