ISC Exam Questions

What is it called when a system has apparent flaws that were deliberately available for penetration

What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

A.
A jail

B.
Investigation

C.
Enticement

D.
Data manipulation

E.
Trapping

Explanation:
Administrators that leave systems with apparent flaws are performing an act of enticement. This is
sometimes called a honeypot.