What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

A.
A jail
B.
Investigation
C.
Enticement
D.
Data manipulation
E.
Trapping
Explanation:
Administrators that leave systems with apparent flaws are performing an act of enticement. This is
sometimes called a honeypot.