kajahah2161 kajahah2161 01-05-2024 Computers and Technology Answered Which of the following is a payload that allows a threat actor to control an exploited target through shell commands? 1) Trojan horse 2) Rootkit 3) Backdoor 4) Logic bomb