Answer: B, D, and E
Option A is incorrect because SAML Assertions are used with the SAML identity provider (IdP).
Option B is CORRECT because you must register the mobile application with the social identity provider (IdP). This process creates a client App ID and App Secret within the social IdP.
Option C is incorrect because OIDC tokens are used as part of the OpenID Connect authentication flow to assert the identity of a user.
Option D is CORRECT because you must register the mobile application with the social identity provider (IdP).This process creates a client App ID and App Secret within the social IdP.
Option E is CORRECT because you must provide a list of scopes that you want to authorize your application to access.
Option F is incorrect because claims represent information about a user.
To configure a user pool social identity provider, you need to:
Choose a social identity provider: Facebook, Google, or log in with Amazon.
Type the app client ID and app client secret that you received from the social identity provider
Type the names of the scopes that you want to authorize. Scopes define which user attributes (such as name and email) you want to access with your app. For Facebook, these should be separated by commas. For Google and log in with Amazon, they should be separated by spaces.
Reference:
https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-social-idp.html