What is it called when a system has apparent flaws that were deliberately available for penetration and exploitation?

What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

What is it called when a system has apparent flaws that were deliberately available for penetration
and exploitation?

A.
A jail

B.
Investigation

C.
Enticement

D.
Data manipulation
E. Trapping

Explanation:
Administrators that leave systems with apparent flaws are performing an act of
enticement. This is sometimes called a honeypot.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

16 − eight =