itstdidticydj705 itstdidticydj705 26-05-2023 Computers and Technology contestada TRUE OR FALSE stealth viruses attack countermeasures, such as antivirus signature files or integrity databases, by searching for these data files and deleting or altering them.