A company notices suspicious network activity against an application that is running on a fleet of Amazon EC2 instances. The suspicious activity is coming from a single IP address. Which AWS service should the company use to block access from this IP address? | AWS Certified Cloud Practitioner Quiz - LeetQuiz