A penetration tester has gained initial access to a Windows server and wants to ensure they maintain persistent access to the compromised system. Which of the following methods BEST achieves this goal while minimizing the chances of detection?
Upgrading a restrictive shell to an unrestricted shell
Running a daemon process that listens for incoming connections
Creating a scheduled task to execute a reverse shell script periodically
Installing a well-known Trojan to maintain a backdoor