Watch this video on YouTube
When considering software security requirements, which operations correctly categorize functional and non-functional requirements?