Which of the following is not an example of approaches for maintaining anonymity?
(a) Using encrypted search engines that don’t share your search data
(b) Use firewalls
(c) Fake email services
(d) Use file shielders
The question was asked in an internship interview.
Question is taken from Cyber Security Privacy topic in chapter Privacy in Cyber Security & Deep Web of Cyber Security