A requirement is something a database must do to meet a business need.
Indicate whether the statement is true or false
Question 2
_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted.
What will be an ideal response?