Watch this video on YouTube
Which of the following is an example of a functional software security requirement?