A defense contractor is enhancing its defensive capabilities by implementing deception technologies. How can a honey token assist in this strategy?
A. It creates false credentials, login credentials, or other data types to distract and gain insight into attackers.
B. It acts as a decoy, mimicking real systems or applications at a finite level, monitoring attacker activity.
C. It uses a network of decoy systems to simulate an entire network to capture the attacker's tactics and tools.
D. It creates fake files that appear to contain sensitive information to capture data on attempts to access and steal data.