id stringlengths 24 24 | title stringclasses 442
values | context stringlengths 151 3.71k | question stringlengths 1 25.7k | answers dict |
|---|---|---|---|---|
57098884ed30961900e842bb | Grape | The Catholic Church uses wine in the celebration of the Eucharist because it is part of the tradition passed down through the ages starting with Jesus Christ at the Last Supper, where Catholics believe the consecrated bread and wine literally become the body and blood of Jesus Christ, a dogma known as transubstantiatio... | What may a priest use in place of wine for consecration for health reasons? | {
"text": [
"grape juice"
],
"answer_start": [
683
]
} |
57098884ed30961900e842bc | Grape | The Catholic Church uses wine in the celebration of the Eucharist because it is part of the tradition passed down through the ages starting with Jesus Christ at the Last Supper, where Catholics believe the consecrated bread and wine literally become the body and blood of Jesus Christ, a dogma known as transubstantiatio... | What is the Catholic dogma known as that believes that consecrated bread and wine from the Last Supper literally became the body and blood of Jesus Christ? | {
"text": [
"transubstantiation"
],
"answer_start": [
303
]
} |
57096f48ed30961900e84116 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What must an operator deviate from to harm the computer? | {
"text": [
"secure procedures"
],
"answer_start": [
531
]
} |
57096f48ed30961900e84117 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What is computer security also known as? | {
"text": [
"cybersecurity or IT security"
],
"answer_start": [
33
]
} |
57096f48ed30961900e84118 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What is the protection of information systems? | {
"text": [
"Computer security"
],
"answer_start": [
0
]
} |
57096f48ed30961900e84119 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What are the ways an operator can malpractice? | {
"text": [
"intentional, accidental, or due to them being tricked"
],
"answer_start": [
457
]
} |
57096f48ed30961900e8411a | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What is the practice that includes controlling physical access to hardware? | {
"text": [
"Computer security"
],
"answer_start": [
0
]
} |
5a5540ac134fea001a0e19f8 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What is the necessity of having an IT? | {
"text": [],
"answer_start": []
} |
5a5540ac134fea001a0e19f9 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What can be caused by neglecting a computer security system? | {
"text": [],
"answer_start": []
} |
5a5540ac134fea001a0e19fa | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What does the IT security protect? | {
"text": [],
"answer_start": []
} |
5a5540ac134fea001a0e19fb | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | How can a computer be attacked? | {
"text": [],
"answer_start": []
} |
5a5540ac134fea001a0e19fc | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | How does IT security work? | {
"text": [],
"answer_start": []
} |
5a5cb75b5e8782001a9d5d6e | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What is the theft or damage to hardware or software? | {
"text": [],
"answer_start": []
} |
5a5cb75b5e8782001a9d5d6f | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | Protecting a device from harm requires deviating from what procedures? | {
"text": [],
"answer_start": []
} |
5a5cb75b5e8782001a9d5d70 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What does computer security misdirect? | {
"text": [],
"answer_start": []
} |
5a5cb75b5e8782001a9d5d71 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | What types of harm can come through network access? | {
"text": [],
"answer_start": []
} |
5a5cb75b5e8782001a9d5d72 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as... | Why would IT security partake in malpractice? | {
"text": [],
"answer_start": []
} |
57097050200fba1400367fef | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What are attacks designed to make a machine or network unavailable to its intended users? | {
"text": [
"Denial of service attacks"
],
"answer_start": [
0
]
} |
57097050200fba1400367ff0 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What does deliberately entering the wrong password enough consecutive times cause? | {
"text": [
"the victim account to be locked"
],
"answer_start": [
246
]
} |
57097050200fba1400367ff1 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What are attacks where innocent systems are fooled into sending traffic to the victom called? | {
"text": [
"reflection and amplification attacks"
],
"answer_start": [
751
]
} |
57097050200fba1400367ff2 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What does DDoS stand for? | {
"text": [
"Distributed denial of service"
],
"answer_start": [
478
]
} |
57097050200fba1400367ff3 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | How can a network attack from a single IP address be blocked? | {
"text": [
"by adding a new firewall rule"
],
"answer_start": [
433
]
} |
5a554385134fea001a0e1a02 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What happens if an attacker enters the wrong password into an account enough times? | {
"text": [],
"answer_start": []
} |
5a554385134fea001a0e1a03 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What is the point of making network resources unavailable to users? | {
"text": [],
"answer_start": []
} |
5a554385134fea001a0e1a04 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | Why is it difficult to defend against DDos? | {
"text": [],
"answer_start": []
} |
5a554385134fea001a0e1a05 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | Other than being locked out what other methods are used in DDos? | {
"text": [],
"answer_start": []
} |
5a554385134fea001a0e1a06 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What causes multiple attacks? | {
"text": [],
"answer_start": []
} |
5a5cb8315e8782001a9d5d78 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What allows a machine to be accessed by its user? | {
"text": [],
"answer_start": []
} |
5a5cb8315e8782001a9d5d79 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What is done to a password to lock out all users at once? | {
"text": [],
"answer_start": []
} |
5a5cb8315e8782001a9d5d7a | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | How is a DDoS from multiple locations defended? | {
"text": [],
"answer_start": []
} |
5a5cb8315e8782001a9d5d7b | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What is an IP address? | {
"text": [],
"answer_start": []
} |
5a5cb8315e8782001a9d5d7c | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What are zombie computers on a botnet? | {
"text": [],
"answer_start": []
} |
570971e6ed30961900e84158 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What were researchers in 2011 able to use as a successful attack vector? | {
"text": [
"a malicious compact disc in a car's stereo system"
],
"answer_start": [
686
]
} |
570971e6ed30961900e84159 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | In cars with built-in voice recognition features, what can the onboard microphones be used for? | {
"text": [
"eavesdropping"
],
"answer_start": [
887
]
} |
570971e6ed30961900e8415a | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | Wifi, bluetooth, and cell phone networks are examples of what? | {
"text": [
"a potential entry point for malware or an attacker"
],
"answer_start": [
592
]
} |
570971e6ed30961900e8415b | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | Assuming access has been gained to the car's internal controller area network, what is it possible to do? | {
"text": [
"disable the brakes and turn the steering wheel"
],
"answer_start": [
83
]
} |
570971e6ed30961900e8415c | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What network is used to contact concierge and emergency assitance services as well as getting navigational and entetainment information? | {
"text": [
"the cell phone network"
],
"answer_start": [
438
]
} |
5a555888134fea001a0e1a3e | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What makes cars a risk for computerized attacks? | {
"text": [],
"answer_start": []
} |
5a555888134fea001a0e1a3f | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | How were researchers able to eavesdrop in a car? | {
"text": [],
"answer_start": []
} |
5a555888134fea001a0e1a40 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | Why are cars with more technology at a higher risk for attack? | {
"text": [],
"answer_start": []
} |
5a555888134fea001a0e1a41 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What increases the likelihood of a car being attacked? | {
"text": [],
"answer_start": []
} |
5a555888134fea001a0e1a42 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What entry points are viable for malware and attackers? | {
"text": [],
"answer_start": []
} |
5a5cd2285e8782001a9d5db4 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What does an external controller area network control? | {
"text": [],
"answer_start": []
} |
5a5cd2285e8782001a9d5db5 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | When were self-driving cars built? | {
"text": [],
"answer_start": []
} |
5a5cd2285e8782001a9d5db6 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What networks prevent malware in connected cars? | {
"text": [],
"answer_start": []
} |
5a5cd2285e8782001a9d5db7 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What did researchers use to prevent attacks in 2011? | {
"text": [],
"answer_start": []
} |
5a5cd2285e8782001a9d5db8 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What can voice recognition not be used for? | {
"text": [],
"answer_start": []
} |
5709744f200fba1400368015 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | How many organisations are estimated to maintain computer systems with effective detection systems? | {
"text": [
"relatively few"
],
"answer_start": [
9
]
} |
5709744f200fba1400368016 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is the basic evidence gathered by that puts criminals behind bars? | {
"text": [
"packet capture appliances"
],
"answer_start": [
516
]
} |
5709744f200fba1400368017 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | The primary obstacle to the eradication of cyber crime is the excessive reliance on what? | {
"text": [
"firewalls and other automated \"detection\" systems"
],
"answer_start": [
421
]
} |
5709744f200fba1400368018 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is the source of the quote? | {
"text": [
"Reuters"
],
"answer_start": [
173
]
} |
5709744f200fba1400368019 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | Electronic theft of data is causing more loss than what? | {
"text": [
"physical stealing of assets"
],
"answer_start": [
289
]
} |
5a555e72134fea001a0e1a5c | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What do companies rely on too much in order to keep their information safe? | {
"text": [],
"answer_start": []
} |
5a555e72134fea001a0e1a5d | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What do even fewer companies have set in place for their defense? | {
"text": [],
"answer_start": []
} |
5a555e72134fea001a0e1a5e | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What do companies have to worry about least? | {
"text": [],
"answer_start": []
} |
5a555e72134fea001a0e1a5f | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is needed to catch these data stealing criminals? | {
"text": [],
"answer_start": []
} |
5a555e72134fea001a0e1a60 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is a common form of theft in companies? | {
"text": [],
"answer_start": []
} |
5a5cd4d65e8782001a9d5dd2 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | Most organizations have what kind of detection system? | {
"text": [],
"answer_start": []
} |
5a5cd4d65e8782001a9d5dd3 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is the name of the company that has lost more through electronic theft? | {
"text": [],
"answer_start": []
} |
5a5cd4d65e8782001a9d5dd4 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What do most companies no longer rely on? | {
"text": [],
"answer_start": []
} |
5a5cd4d65e8782001a9d5dd5 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | Physical stealing of assets is a bigger problem than what? | {
"text": [],
"answer_start": []
} |
5a5cd4d65e8782001a9d5dd6 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What do criminals use to avoid being captured? | {
"text": [],
"answer_start": []
} |
5709750fed30961900e84188 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | Technology that is used to implement secure operating systems is one use of what term? | {
"text": [
"computer security"
],
"answer_start": [
21
]
} |
5709750fed30961900e84189 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What does EAL stand for? | {
"text": [
"Evaluation Assurance Levels"
],
"answer_start": [
327
]
} |
5709750fed30961900e8418a | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is the standard of EAL4? | {
"text": [
"Methodically Designed, Tested and Reviewed"
],
"answer_start": [
419
]
} |
5709750fed30961900e8418b | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is the standard for EAL6? | {
"text": [
"Semiformally Verified Design and Tested"
],
"answer_start": [
578
]
} |
5709750fed30961900e8418c | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is an example of a system that meets EAL6? | {
"text": [
"Integrity-178B"
],
"answer_start": [
630
]
} |
5a55621f134fea001a0e1a70 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | Which system is used by the Airbus A380 and military jets? | {
"text": [],
"answer_start": []
} |
5a55621f134fea001a0e1a71 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | How common are the formal verification for the highest levels? | {
"text": [],
"answer_start": []
} |
5a55621f134fea001a0e1a72 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | In the 1980s the Department of Defense used which standards? | {
"text": [],
"answer_start": []
} |
5a55621f134fea001a0e1a73 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What does Common Criteria refer to? | {
"text": [],
"answer_start": []
} |
5a55621f134fea001a0e1a74 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | Which level do many common operating systems meet? | {
"text": [],
"answer_start": []
} |
5a5cd95a5e8782001a9d5de6 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | When was the Common Criteria defined? | {
"text": [],
"answer_start": []
} |
5a5cd95a5e8782001a9d5de7 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | Who created the Common Criteria? | {
"text": [],
"answer_start": []
} |
5a5cd95a5e8782001a9d5de8 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is the name of a system that meets the EAL4 standard? | {
"text": [],
"answer_start": []
} |
5a5cd95a5e8782001a9d5de9 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What makes it difficult for systems to use the EAL4 standard? | {
"text": [],
"answer_start": []
} |
5a5cd95a5e8782001a9d5dea | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is an example of a system that uses the Orange Book Standards? | {
"text": [],
"answer_start": []
} |
57097780200fba1400368033 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | When was Chine's network security and information technology leadership team established? | {
"text": [
"February 27, 2014"
],
"answer_start": [
84
]
} |
57097780200fba1400368034 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | What is the reason for studying the promotion of national network security ad information technology law? | {
"text": [
"enhanced national security capabilities."
],
"answer_start": [
565
]
} |
57097780200fba1400368035 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | What country has a network security and information technology leadership team?? | {
"text": [
"China"
],
"answer_start": [
0
]
} |
5a5579bf134fea001a0e1ad2 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Why was China's network security team established? | {
"text": [],
"answer_start": []
} |
5a5579bf134fea001a0e1ad3 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | What long term developments do they hope to achieve? | {
"text": [],
"answer_start": []
} |
5a5579bf134fea001a0e1ad4 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Why is network security under study? | {
"text": [],
"answer_start": []
} |
5a5579bf134fea001a0e1ad5 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Who is the leadership team? | {
"text": [],
"answer_start": []
} |
5a5579bf134fea001a0e1ad6 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Who is promoting the leadership team and its developments? | {
"text": [],
"answer_start": []
} |
5a5d023b5e8782001a9d5e54 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Who is researching microeconomic policy? | {
"text": [],
"answer_start": []
} |
5a5d023b5e8782001a9d5e55 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Which fields unrelated to network security does China's leadership team research? | {
"text": [],
"answer_start": []
} |
5a5d023b5e8782001a9d5e56 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | Who is tasked with the short term development of network security? | {
"text": [],
"answer_start": []
} |
5a5d023b5e8782001a9d5e57 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | When were China's enhanced national security capabilities established? | {
"text": [],
"answer_start": []
} |
570978aaed30961900e841ae | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What is the act of surreptitiously listening to a private conversation? | {
"text": [
"Eavesdropping"
],
"answer_start": [
0
]
} |
570978aaed30961900e841af | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Conversations that people eavesdrop on are typically between who? | {
"text": [
"hosts on a network"
],
"answer_start": [
99
]
} |
570978aaed30961900e841b0 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Who has used programs such as Carnivore and NarusInsight to eavesdrop on the systems of internet service providers? | {
"text": [
"the FBI and NSA"
],
"answer_start": [
195
]
} |
570978aaed30961900e841b1 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Eavesdropping on a closed system via the faint electro-magnetic trasmissions generated by the hardware has been referred to as what by the NSA? | {
"text": [
"TEMPEST"
],
"answer_start": [
469
]
} |
570978aaed30961900e841b2 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What are machines that operate with no contact to the outside world called? | {
"text": [
"a closed system"
],
"answer_start": [
300
]
} |
5a554ade134fea001a0e1a16 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | How can closed systems be eavesdropped upon? | {
"text": [],
"answer_start": []
} |
5a554ade134fea001a0e1a17 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Who is guilty of eavesdropping on private conversations? | {
"text": [],
"answer_start": []
} |
5a554ade134fea001a0e1a18 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Who does the FBI and NSA use Carnivore and Naruslnight to eavesdrop on? | {
"text": [],
"answer_start": []
} |
5a554ade134fea001a0e1a19 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Who uses the programs Carnivore and Naruslnsight? | {
"text": [],
"answer_start": []
} |
5a554ade134fea001a0e1a1a | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What is eavesdropping? | {
"text": [],
"answer_start": []
} |
5a5cba215e8782001a9d5d8c | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What programs do ISPs use to eavesdrop on the FBI? | {
"text": [],
"answer_start": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.