monkey5207 monkey5207 27-12-2022 Computers and Technology Answered 5. (5 points) once the attacker gained access to the victim's machine, what executable did they first use to run commands on the host? cite evidence from 'splunk-exec.csv'.