An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?
Intrusion Detection System (IDS)
DNS Sinkhole
Honeytoken
Honeynet
Firewall
Honeypot