1. Data breaches have different methods of attacks at ATMs because criminals must obtain a PIN and the card information on the magnetic strip.
True or False
2. While the skimming devices and equipment used ATM attacks have not changed much over the years, the criminals' methods have become far more sophisticated, such as understanding how the ATM network processes transactions.
True
False
3. Which type of risk is associated most with short-term bonds?
Liquidity Risk
Interest Rate Risk
Default Risk
Reinvestment Rate Risk