A software organization has implemented a deception strategy to detect unauthorized data access attempts. An attacker, believing to have successfully obtained sensitive data, actually accessed a fabricated document designed to look like real sensitive information. What specific type of deception technology did the organization deploy?
A) Firewall
B) Honeypot
C) Encryption
D) Intrusion Detection System