What are “redundant boot persistence mechanisms”?

I’m trying to learn techniques used in malware development.

Dexphot’s advanced techniques, such as the use of fileless execution, polymorphic techniques, and smart and redundant boot persistence mechanisms. source

I was searching for the term “redundant boot persistence mechanism”, but couldn’t find anything useful.