A company wants to migrate its applications to a VPC on AWS. These applications will need to access on-premises resources.
What combination of actions will enable the company to accomplish this goal? (Choose two.)
A web application running on AWS has been spammed with malicious requests from a recurring set of IP addresses.
Which AWS service can help secure the application and block the malicious traffic?