alyssayogi5811 alyssayogi5811 11-01-2024 English contestada after two days of work, you successfully exploited a traversal vulnerability and gained root access to a centos 6.5 server. which of the following is the best option to maintain access?