mocz4603 mocz4603 17-05-2024 Computers and Technology Answered Upon access, the documents help capture the attacker's tactics and tools. What type of deception technology best describes this scenario?