Back to dashboard Read module

Quiz reading view

Quiz 1G — Emerging Issues in Cybersecurity Law

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Emerging Issues in Cybersecurity Law as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Emerging Issues in Cybersecurity Law as learned.

Type Quiz
Updated 2026-04-12
Reading time 5 min read
Questions 10

Check the reading before you move on.

01g-emerging-issues.md | Last updated: 2026-04-12

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

The U.S. Vulnerabilities Equities Process (VEP) is best described as:

Question 2

A ransomware group encrypted an energy company's control systems. The company's legal team is considering authorizing payment of the $5M ransom demand. Before approving payment, counsel's FIRST legal obligation is to:

Question 3

CISA Binding Operational Directive 20-01 requires what from federal civilian executive branch agencies?

Question 4

DOJ's 2022 CFAA charging policy announced that prosecutors should not charge which category of conduct?

Question 5

OFAC's civil penalty standard for making a ransomware payment to a designated group is:

Question 6

What is the primary cybersecurity concern about government-mandated "lawful access" mechanisms (sometimes called backdoors) in encryption systems, as identified by the security research community?

Question 7

The Apple-UK Technical Capability Notice dispute (2025-2026) illustrates which tension in the encryption debate?

Question 8

Under the CLOUD Act, U.S. service providers must comply with valid U.S. legal process for data stored abroad. The Act also creates what mechanism to reduce international legal conflicts?

Question 9

A security researcher discovers a critical vulnerability in a major bank's mobile app. The bank has no published VDP and has not authorized any security research. Under the post-Van Buren + DOJ good-faith research policy framework, what is the researcher's most legally protected course of action?

Question 10

CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act) will, when fully implemented, require covered entities to report ransomware payments within how many hours?