#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Once this bidirectional communication has been made, an attacker has access inside the target environment and can usually control the activity by manually launching commands;

Answer

command and control