after two days of work, you successfully exploited a traversal vulnerability and gained root access to a centos 6.5 server. which of the following is the best option to maintain access?

Respuesta :

Q&A Platform for Education
Platform Explore for Education