NAC What Can an Attacker Do with Alternate Data Streams Question

Question Description

I’m working on a cyber security discussion question and need an explanation to help me understand better.

What can an attacker do with Alternate Data Streams ?