Back to dashboard Read module

Quiz reading view

Quiz 1A — CFAA and the Federal Criminal Toolkit

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating CFAA and the Federal Criminal Toolkit as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating CFAA and the Federal Criminal Toolkit as learned.

Type Quiz
Updated 2026-04-12
Reading time 4 min read
Questions 10

Check the reading before you move on.

01a-cfaa-federal-statutes.md | Last updated: 2026-04-12

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

Under Van Buren v. United States (2021), which of the following best describes when someone "exceeds authorized access" under the CFAA?

Question 3

What makes 18 U.S.C. § 1028A (aggravated identity theft) particularly significant in cyber prosecution plea negotiations?

Question 4

Prosecutors charged a hacking syndicate with CFAA, wire fraud, identity theft, AND RICO. What additional element do they need to prove for the RICO charges that they do not need for CFAA?

Question 5

A company's employee accesses the company's HR database (which she is authorized to use) and downloads salary data to sell to a competitor. Under Van Buren, is this a CFAA violation?

Question 6

Under 18 U.S.C. § 1343 (wire fraud), what is the maximum prison term for a single count of wire fraud in most cyber-fraud cases?

Question 7

What does the "protected computer" standard under CFAA (18 U.S.C. § 1030(e)(2)) practically mean?

Question 8

The FTC uses 15 U.S.C. § 45 to enforce data security standards. Against whom is this enforcement primarily directed?

Question 9

A hacker operating from Eastern Europe steals credentials from a U.S. e-commerce platform and sells them on a dark web marketplace. Which CFAA subsection most directly covers the credential trafficking conduct?

Question 10

What is the primary significance of Van Buren for security researchers who probe company systems with valid authentication tokens against the company's terms of service?