An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?
Honeypot
DNS Sinkhole
Honeytoken
Firewall
Honeynet
Intrusion Detection System (IDS)