What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

A.
A jail
B.
Investigation
C.
Enticement
D.
Data manipulation
E. Trapping
Explanation:
Administrators that leave systems with apparent flaws are performing an act of
enticement. This is sometimes called a honeypot.