What decoy system can support detection efforts by mimicking specific applications and gathering information on the attacker's tactics and tools?
a) Firewall
b) Antivirus software
c) Honeypot
d) Intrusion Detection System (IDS)