After two days of work, you successfully exploited a traversal vulnerability and gained root access to a CentOS 6.5 server. Which of the following is the best option to maintain access? 1) Install a backdoor on the server 2) Create a new user account with root privileges 3) Modify the server's firewall rules to allow remote access 4) Disable logging and monitoring on the server