Someone hacks into your information system and discovers a file of apparently critical information to your organizations performance. this file contains false information and has been placed in the system by the organization as a decoy. this file is an example of: