An ethical hacker is given no prior knowledge of the network and has a specific framework in which to work. The agreement specifies boundaries, nondisclosure agreements, and a completion date definition. Which of the following statements are true?
a. Rules of engagement
b. End-user license agreement
c. Terms of service
d. Privacy policy