After two days of work, you successfully exploited a traversal vulnerability and gained root access to a CentOS 6.5 server. Which of the following is the best option to maintain access?
1) Install a backdoor on the server
2) Create a new user account with root privileges
3) Modify the server's firewall rules to allow remote access
4) Disable logging and monitoring on the server