Which technique describes a legal values constraint?

Prepare for IT Operations Management exams. Use our extensive question bank and real-world scenarios to master the subject. Get ready for your ITOM exam with confidence!

Multiple Choice

Which technique describes a legal values constraint?

Explanation:
A legal values constraint restricts the data to values that are permitted by policy or business rules. Requiring a birthdate to be after a specific date, such as January 1, 1900, constrains the field to a plausible and authorized range. This ensures the value entered is meaningful and compliant with domain rules, making it a classic example of enforcing legal values. Encrypting data at rest is about protecting data confidentiality, not restricting the values that can be stored. Storing passwords in plain text goes against security best practices, not about value constraints. Allowing nulls in an SSN concerns whether the field can be empty, rather than validating that a value falls within an acceptable range.

A legal values constraint restricts the data to values that are permitted by policy or business rules. Requiring a birthdate to be after a specific date, such as January 1, 1900, constrains the field to a plausible and authorized range. This ensures the value entered is meaningful and compliant with domain rules, making it a classic example of enforcing legal values.

Encrypting data at rest is about protecting data confidentiality, not restricting the values that can be stored. Storing passwords in plain text goes against security best practices, not about value constraints. Allowing nulls in an SSN concerns whether the field can be empty, rather than validating that a value falls within an acceptable range.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy