A software organization has implemented a deception strategy to detect unauthorized data access attempts. An attacker, believing to have successfully obtained sensitive data, actually accessed a fabricated document designed to look like real sensitive information. What specific type of deception technology did the organization deploy? A) Firewall B) Honeypot C) Encryption D) Intrusion Detection System