Which combination of steps should the security engineer take to remediate this issue?
(Choose three.)
Change the replication configuration to use the key in us-east-1 to encrypt the objects that are in the destination S3 bucket.
Grant the IAM role the kms:Encrypt permission for the key in us-east-1 that encrypts source objects.
Grant the IAM role the s3:GetObjectVersionForReplication permission for objects that are in the source S3 bucket.
Grant the IAM role the kms:Decrypt permission for the key in us-east-1 that encrypts source objects.
Change the key policy of the key in us-east-1 to grant the kms:Decrypt permission to the security engineer’s IAM account.
Grant the IAM role the kms:Encrypt permission for the key in us-west-2 that encrypts objects that are in the destination S3 bucket.