after two days of work, you successfully exploited a traversal vulnerability and gained root access to a centos 6.5 server. which of the following is the best option to maintain access?