Computer Science Homework Help

NAC What Can an Attacker Do with Alternate Data Streams Question

 

I’m working on a cyber security discussion question and need an explanation to help me understand better.

What can an attacker do with Alternate Data Streams ?