A Stealth rule is used to:
A.
Use the Security Gateway to hide the border router from internal attacks.
B.
Cloak the type of Web server in use behind the Security Gateway.
C.
Prevent communication to the Security Gateway itself.
D.
Prevent tracking of hosts behind the Security Gateway.