roubisonbrook2046 roubisonbrook2046 04-04-2024 Computers and Technology contestada Which of the following is a payload that allows a threat actor to control an exploited target through shell commands?A) ListenerB) MetasploitC) MeterpreterD) Reverse