Once the first-stage malware enters the targeted machine, it generally needs to settle down, deliver, and configure additional modules (commonly by downloading or extracting them from its body), and then make sure it will survive the system reboot. That's what deployment and persistence are mainly about.
The deployment mechanisms vary for macOS and iOS systems. Let's take a look at each of them in greater detail.