Answer – C
AWS Docs Provides the following:
####
You can use HTTPS (TLS) to help prevent potential attackers from eavesdropping on or manipulating network traffic using person-in-the-middle or similar attacks. You should allow only encrypted connections over HTTPS (TLS) using the aws:SecureTransport condition on Amazon S3 bucket policies.
####
Please refer to page 462 of the below AWS Docs link on the title "Enforce encryption of data in transit" :
https://docs.aws.amazon.com/AmazonS3/latest/dev/s3-dg.pdf
One can utilize an AWS VPN over AWS Direct connect to get all low latency and encrypted connection features. The below diagram from the AWS Documentation shows the architecture of such a setup.
Option A is incorrect because this alone with not guarantee encryption of data in transit.
Option B is incorrect because this alone will not guarantee encryption of the connection.
Option D is incorrect because this using HTTP does not encrypt data in transit.
For more information on AWS Direct Connect plus VPN, please refer to the below URL:
https://docs.aws.amazon.com/aws-technical-content/latest/aws-vpc-connectivity-options/aws-direct-connect-plus-vpn-network-to-amazon.html