Back to dashboard Read module

Quiz reading view

Quiz 01M — Hacker Lawsuits: The Cases That Define Your Scope

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Hacker Lawsuits: The Cases That Define Your Scope as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Hacker Lawsuits: The Cases That Define Your Scope as learned.

Type Quiz
Updated 2026-04-17
Reading time 8 min read
Questions 10

Check the reading before you move on.

01m-hacker-lawsuits.md | Last updated: 2026-04-17

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

In Van Buren v. United States (2021), the Supreme Court addressed the scope of "exceeds authorized access" under the CFAA. What was the Court's core holding?

Question 2

hiQ Labs, Inc. v. LinkedIn Corp. (2022) addressed CFAA liability for scraping publicly accessible data. What was the key legal rationale for finding that hiQ's scraping was not "without authorization" under the CFAA?

Question 3

United States v. Auernheimer (Weev, 2014) involved an IDOR vulnerability on AT&T's website — incrementing IDs in a URL to access 114,000 email addresses. The conviction was overturned. On what basis?

Question 4

What is the most dangerous legal lesson from the Auernheimer case for security researchers who discover unauthenticated data exposures?

Question 5

In Facebook, Inc. v. Power Ventures, Inc. (2016), the Ninth Circuit found CFAA liability after Power Ventures bypassed Facebook's IP blocks following a cease-and-desist letter. What principle does this case establish?

Question 6

Under the "Hacker's Protocol" described in Module 1M, which action provides the strongest legal protection before beginning security testing of a target?

Question 7

Sandvig v. Barr addressed whether researchers violate the CFAA by creating fake accounts to test platforms for algorithmic discrimination. What was the court's holding regarding ToS violations as a basis for CFAA liability?

Question 8

A security researcher discovers that a company's API returns data for any integer user ID supplied in the request — no authentication token is required. She downloads 500 records to document the vulnerability, then posts the data on Twitter to "raise awareness." Which of the following best describes her legal exposure under current CFAA doctrine?

Question 9

According to Module 1M's risk analysis table, a researcher who continues probing a target after the company blocks her IP address and demands she stop faces which risk level?

Question 10

After Van Buren (2021), which of the following scenarios remains the MOST legally dangerous for a security researcher, even if no authentication bypass occurred?