ISC Exam Questions

What is it called when a system has apparent flaws that were deliberately available for penetration

What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

A.
A jail

B.
Investigation

C.
Enticement

D.
Data manipulation
E. Trapping

Explanation:
Administrators that leave systems with apparent flaws are performing an act of
enticement. This is sometimes called a honeypot.