A user needs to put sensitive data in an Amazon S3 bucket that can be accessed through an S3 VPC endpoint only. The user must ensure that resources in the VPC can only access the single S3 bucket.
Which combination of actions will meet the requirements? (Choose two.)
A. Configure the bucket policy to only allow access through the S3 Private Endpoint.
B. Modify the VPC endpoint policy on the bucket to only allow the VPC to access it.
C. Modify the VPC peering configuration to only allow access to the S3 private Endpoint.
D. Configure the VPC endpoint policy to only allow the VPC to access the specific S3 bucket.
E. Configure the IAM policy attached to the S3 bucket to only allow access from the specific VPC.
Which combination of actions will meet the requirements? (Choose two.)
A. Configure the bucket policy to only allow access through the S3 Private Endpoint.
B. Modify the VPC endpoint policy on the bucket to only allow the VPC to access it.
C. Modify the VPC peering configuration to only allow access to the S3 private Endpoint.
D. Configure the VPC endpoint policy to only allow the VPC to access the specific S3 bucket.
E. Configure the IAM policy attached to the S3 bucket to only allow access from the specific VPC.