header bg

Question:

A hacker uses Alternate Data Streams (ADS) for?

A Hiding evidence
Explaination