A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot.
Which of the following techniques would BEST support this objective?
Create a one-shot systemd service to establish a reverse shell.