Placing a false (decoy) text file in a sensitive location (such as /docs/salaries) is an example of a honeytoken or deception technique. This technique is used to attract insider attackers and monitor their actions when they attempt to access the file. Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 1.1: "Honeytokens are decoy files or records placed in locations of interest to attract and detect insider threats." Exam Objectives 1.1: "Explain the importance of security concepts in an enterprise environment."