a company hires an outside penetration testing team. a scope is agreed upon, dictating what systems may be involved and what systems may not. the penetration team proceeds with its tasks, all the way up to exploitation, when suddenly a production server is knocked offline. with the possible exception of the authorization, what aspect of penetration testing is now the most critical?