A finance company has implemented a deception strategy to plant documents that appear to contain sensitive information. Upon access, the documents help capture the attacker's tactics and tools. What type of deception technology best describes this scenario? A.Honeynet B.Honeytoken C.Honeypot D.Honeyfile