What specific type of deception technology did the organization deploy to detect unauthorized data access attempts, where an attacker accessed a fabricated document designed to look like real sensitive information?
a) Honeypot
b) Firewall
c) Intrusion Detection System (IDS)
d) Virtual Private Network (VPN)