What is the purpose of the Command and Control stage in a cyber attack?

(Select The Best Answer)