Watch this video on YouTube
In a scenario where an ethical hacker discovers a vulnerability in a client’s system, which action aligns with standard ethical hacking procedures?