**Scenario:** During a penetration test, your team successfully exploits a vulnerability and gains unauthorized access to a critical system. What should be the next step?
A) Report the findings to management immediately
B) Continue testing to identify more vulnerabilities
C) Document the vulnerability and start remediation
D) Notify the system owner to take immediate action