id
stringlengths
24
24
title
stringclasses
442 values
context
stringlengths
151
3.71k
question
stringlengths
1
25.7k
answers
dict
5a5546d5134fea001a0e1a0f
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What can an attacker install to your computer in order to collect personal data?
{ "text": [], "answer_start": [] }
5a5546d5134fea001a0e1a10
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What can infect other computers from your own?
{ "text": [], "answer_start": [] }
5a5cb9315e8782001a9d5d82
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What can an authorized user with access to a computer do?
{ "text": [], "answer_start": [] }
5a5cb9315e8782001a9d5d83
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
How are computers made secure?
{ "text": [], "answer_start": [] }
5a5cb9315e8782001a9d5d84
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What does CD-ROM stand for?
{ "text": [], "answer_start": [] }
5a5cb9315e8782001a9d5d85
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What is the name of a program designed to attack a computer?
{ "text": [], "answer_start": [] }
5a5cb9315e8782001a9d5d86
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
How does a user bypass a compromised security?
{ "text": [], "answer_start": [] }
5709a8dd200fba140036822b
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
UI redress attack or User Interface redress attack is also known as what?
{ "text": [ "Clickjacking" ], "answer_start": [ 0 ] }
5709a8dd200fba140036822c
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What is a malicious technique in which an attacker tricks the user into clicking on a button or link?
{ "text": [ "Clickjacking" ], "answer_start": [ 0 ] }
5709a8dd200fba140036822d
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where are the clicks meant for the top level page routed?
{ "text": [ "some other irrelevant page" ], "answer_start": [ 407 ] }
5709a8dd200fba140036822e
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where would a password typed on a seemingly authetic webpage be directed?
{ "text": [ "into an invisible frame controlled by the attacker" ], "answer_start": [ 748 ] }
5709a8dd200fba140036822f
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
How istricking the user accomplished in clickjacking?
{ "text": [ "using multiple transparent or opaque layers" ], "answer_start": [ 264 ] }
5a5551b9134fea001a0e1a20
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What is intended to be hijacked through a page overlay?
{ "text": [], "answer_start": [] }
5a5551b9134fea001a0e1a21
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What else can be hijacked through UI redress?
{ "text": [], "answer_start": [] }
5a5551b9134fea001a0e1a22
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What part of a webpage is meant to collect keystrokes?
{ "text": [], "answer_start": [] }
5a5551b9134fea001a0e1a23
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Why can the user not see the other page used by the attacker?
{ "text": [], "answer_start": [] }
5a5551b9134fea001a0e1a24
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where is are the passwords and information stored by the attacker?
{ "text": [], "answer_start": [] }
5a5cbc6f5e8782001a9d5d96
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What is avoiding a UI redress attack called?
{ "text": [], "answer_start": [] }
5a5cbc6f5e8782001a9d5d97
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
How are clicks routed back to the top level page?
{ "text": [], "answer_start": [] }
5a5cbc6f5e8782001a9d5d98
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
How is an legitimate webpage created?
{ "text": [], "answer_start": [] }
5a5cbc6f5e8782001a9d5d99
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What is another name for hijacking keystrokes?
{ "text": [], "answer_start": [] }
5a5cbc6f5e8782001a9d5d9a
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where is a user redirected to after putting in their password?
{ "text": [], "answer_start": [] }
5709a976ed30961900e843da
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
How many computers were connected to the internet in 1988?
{ "text": [ "60,000" ], "answer_start": [ 14 ] }
5709a976ed30961900e843db
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
When was the first computer worm released?
{ "text": [ "November 2, 1988" ], "answer_start": [ 137 ] }
5709a976ed30961900e843dc
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Who was the first computer worm traced back to?
{ "text": [ "Robert Tappan Morris, Jr." ], "answer_start": [ 414 ] }
5709a976ed30961900e843dd
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
What is a malicious code that demands processor time and spreads itself to other computers?
{ "text": [ "computer worm" ], "answer_start": [ 318 ] }
5709a976ed30961900e843de
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Why did Morris Jr make the computer worm?
{ "text": [ "he wanted to count how many machines were connected to the Internet" ], "answer_start": [ 450 ] }
5a557057134fea001a0e1a82
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
What types of computers were connected to the internet in 1988?
{ "text": [], "answer_start": [] }
5a557057134fea001a0e1a83
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
On Nov 2, 1988 what caused many computers to slow down?
{ "text": [], "answer_start": [] }
5a557057134fea001a0e1a84
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
When was the first computer worm?
{ "text": [], "answer_start": [] }
5a557057134fea001a0e1a85
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Who created the first computer worm?
{ "text": [], "answer_start": [] }
5a557057134fea001a0e1a86
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
How old was the Cornell University Grad Student who created the worm?
{ "text": [], "answer_start": [] }
5a5ce0995e8782001a9d5dfa
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
How many computers began to slow down on Nov. 2, 1988?
{ "text": [], "answer_start": [] }
5a5ce0995e8782001a9d5dfb
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Who tracked down the first computer worm?
{ "text": [], "answer_start": [] }
5a5ce0995e8782001a9d5dfc
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
When was the computer worm caught?
{ "text": [], "answer_start": [] }
5a5ce0995e8782001a9d5dfd
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Where was the computer worm created?
{ "text": [], "answer_start": [] }
5a5ce0995e8782001a9d5dfe
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Which internet connected computers slowed down?
{ "text": [], "answer_start": [] }
5709aa1f200fba1400368235
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Who are Rescator?
{ "text": [ "a Russian/Ukrainian hacking ring" ], "answer_start": [ 18 ] }
5709aa1f200fba1400368236
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
What was stolen from Target Corporation computers in 2013?
{ "text": [ "40 million credit cards" ], "answer_start": [ 137 ] }
5709aa1f200fba1400368237
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
How many credit card numbers were stole from Home Depot in 2014?
{ "text": [ "between 53 and 56 million" ], "answer_start": [ 210 ] }
5709aa1f200fba1400368238
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
What machines were involved in the physical security breaches that played a large role in the incident?
{ "text": [ "self checkout machines" ], "answer_start": [ 349 ] }
5709aa1f200fba1400368239
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Who is Jim Walter?
{ "text": [ "director of threat intelligence operations at security technology company McAfee" ], "answer_start": [ 503 ] }
5a55742a134fea001a0e1a96
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
What was done when credit cards were stolen?
{ "text": [], "answer_start": [] }
5a55742a134fea001a0e1a97
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
What was the main breach?
{ "text": [], "answer_start": [] }
5a55742a134fea001a0e1a98
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Who could have easily stopped the hacking?
{ "text": [], "answer_start": [] }
5a55742a134fea001a0e1a99
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Unsophisticated malware was used on what?
{ "text": [], "answer_start": [] }
5a55742a134fea001a0e1a9a
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Why was the malware uninteresting?
{ "text": [], "answer_start": [] }
5a5ce6645e8782001a9d5e0e
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Who was the leader of Rescator?
{ "text": [], "answer_start": [] }
5a5ce6645e8782001a9d5e0f
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
What was stolen from McAfee?
{ "text": [], "answer_start": [] }
5a5ce6645e8782001a9d5e10
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
When was the investigation concluded?
{ "text": [], "answer_start": [] }
5a5ce6645e8782001a9d5e11
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
Why weren't the companies warned about the threat?
{ "text": [], "answer_start": [] }
5a5ce6645e8782001a9d5e12
Computer_security
In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys...
When was Rescator formed?
{ "text": [], "answer_start": [] }
5709aacc200fba140036823f
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What does NCAZ stand for?
{ "text": [ "Nationales Cyber-Abwehrzentrum" ], "answer_start": [ 179 ] }
5709aacc200fba1400368240
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What does NCAZ take care of?
{ "text": [ "national security aspects" ], "answer_start": [ 622 ] }
5709aacc200fba1400368241
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
When was NCAZ opened?
{ "text": [ "June 16, 2011" ], "answer_start": [ 52 ] }
5709aacc200fba1400368242
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Whan was NCAZ founded?
{ "text": [ "February 23, 2011" ], "answer_start": [ 727 ] }
5709aacc200fba1400368243
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What is the purpose of NCAZ?
{ "text": [ "to detect and prevent attacks against the national infrastructure" ], "answer_start": [ 749 ] }
5a557a6e134fea001a0e1adc
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Why does Berlin start a National Cyber Defense Initiative?
{ "text": [], "answer_start": [] }
5a557a6e134fea001a0e1add
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Why does NCAZ work closely with BSI?
{ "text": [], "answer_start": [] }
5a557a6e134fea001a0e1ade
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Who takes care of national security?
{ "text": [], "answer_start": [] }
5a557a6e134fea001a0e1adf
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What incidents are it to prevent?
{ "text": [], "answer_start": [] }
5a557a6e134fea001a0e1ae0
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What was the Stuxnet incident?
{ "text": [], "answer_start": [] }
5a5d037f5e8782001a9d5e5c
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Where is the German Minister for Home Affairs located?
{ "text": [], "answer_start": [] }
5a5d037f5e8782001a9d5e5d
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
When did the incident in Stuxnet happen?
{ "text": [], "answer_start": [] }
5a5d037f5e8782001a9d5e5e
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Where is the BSI located?
{ "text": [], "answer_start": [] }
5a5d037f5e8782001a9d5e5f
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
Who opened the BDN?
{ "text": [], "answer_start": [] }
5a5d037f5e8782001a9d5e60
Computer_security
Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ...
What is the primary task of the Minister for Home Affairs?
{ "text": [], "answer_start": [] }
57097eaced30961900e84218
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What is the approach to Judiasm that subscribes to a tradition of mass revelation?
{ "text": [ "Orthodox" ], "answer_start": [ 0 ] }
57097eaced30961900e84219
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What is the name of the book that has the laws and ethics for Orthodox Judaism?
{ "text": [ "Torah" ], "answer_start": [ 185 ] }
57097eaced30961900e8421a
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
what texts were legislated by the Tanarim and Amoraim?
{ "text": [ "Talmudic" ], "answer_start": [ 212 ] }
57097eaced30961900e8421b
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What besides Modern Orthodox Judaism does Orthodox Judaism consist of?
{ "text": [ "Haredi Judaism" ], "answer_start": [ 478 ] }
57097eaced30961900e8421c
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
Orthodox Judaism is a self-identification that distinguishes it from what?
{ "text": [ "pre-modern Judaism" ], "answer_start": [ 777 ] }
5a578a88770dc0001aeefc62
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What is Orthodox Christianity a religion that subscribes to?
{ "text": [], "answer_start": [] }
5a578a88770dc0001aeefc63
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What does Orthodox Christianity adhere to?
{ "text": [], "answer_start": [] }
5a578a88770dc0001aeefc64
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
Who is the Bible legislated by?
{ "text": [], "answer_start": [] }
5a578a88770dc0001aeefc65
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
Where will you not find Modern Judaism?
{ "text": [], "answer_start": [] }
5a578a88770dc0001aeefc66
Orthodox_Judaism
Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho...
What is a religion with a single philosophy?
{ "text": [], "answer_start": [] }
57097f32ed30961900e84222
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
What is the global Jewish news service known as?
{ "text": [ "JTA" ], "answer_start": [ 164 ] }
57097f32ed30961900e84223
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
What is New Jersey's largest daily paper?
{ "text": [ "the Star-Ledger" ], "answer_start": [ 205 ] }
57097f32ed30961900e84224
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
What term do media entities refrain from using?
{ "text": [ "\"ultra-Orthodox" ], "answer_start": [ 98 ] }
57097f32ed30961900e84225
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
Who is the spiritual leader of Temple Israel Community Center?
{ "text": [ "Rabbi Shammai Engelmayer" ], "answer_start": [ 474 ] }
57097f32ed30961900e84226
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
Where is the Temple Israel Community Center located?
{ "text": [ "Cliffside Park" ], "answer_start": [ 554 ] }
5a578a9d770dc0001aeefc6c
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
What did the New England press association claim?
{ "text": [], "answer_start": [] }
5a578a9d770dc0001aeefc6d
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
How large is the global Jewish news service?
{ "text": [], "answer_start": [] }
5a578a9d770dc0001aeefc6e
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
The Religion Newswriters Association was the first news source to drop what name?
{ "text": [], "answer_start": [] }
5a578a9d770dc0001aeefc6f
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
What is a New York paper still using the term ultra-orthodox?
{ "text": [], "answer_start": [] }
5a578a9d770dc0001aeefc70
Orthodox_Judaism
According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t...
Who was the executive editor of the Star-Ledger?
{ "text": [], "answer_start": [] }
5709806e200fba14003680a5
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What is the name of the movement that comporises a fairly broad spectrum of distinct but related philosophies?
{ "text": [ "Modern Orthodoxy" ], "answer_start": [ 0 ] }
5709806e200fba14003680a6
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What integrity is orthodox judaism trying to preserve?
{ "text": [ "halakha" ], "answer_start": [ 675 ] }
5709806e200fba14003680a7
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
Who does Modern Orthodoxy assign a central role to?
{ "text": [ "People of Israel" ], "answer_start": [ 847 ] }
5709806e200fba14003680a8
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What kind of work does orthodox Judiasm seek to transform the world with?
{ "text": [ "Divine work" ], "answer_start": [ 559 ] }
5709806e200fba14003680a9
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What is modern cutlture in conflict with?
{ "text": [ "Torah" ], "answer_start": [ 742 ] }
5a57b8de770dc0001aeefcf0
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What comprises a fairly narrow spectrum of movements?
{ "text": [], "answer_start": [] }
5a57b8de770dc0001aeefcf1
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What are distinct and non-related in Modern Orthodoxy?
{ "text": [], "answer_start": [] }
5a57b8de770dc0001aeefcf2
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What does Classical Orthodoxy hold to be true?
{ "text": [], "answer_start": [] }
5a57b8de770dc0001aeefcf3
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
What can Orthodox Judaism be harmed by it's interaction with?
{ "text": [], "answer_start": [] }
5a57b8de770dc0001aeefcf4
Orthodox_Judaism
Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att...
Who do Modern Orthodoxy assign a non-central role to?
{ "text": [], "answer_start": [] }
570980f2200fba14003680c1
Orthodox_Judaism
Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth...
How do orthodox women dress mosly?
{ "text": [ "covered" ], "answer_start": [ 151 ] }
570980f2200fba14003680c2
Orthodox_Judaism
Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth...
what part of their body do married women cover with a scarf?
{ "text": [ "hair" ], "answer_start": [ 200 ] }
570980f2200fba14003680c3
Orthodox_Judaism
Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth...
What is the Skullcap that orthodox men wear known as?
{ "text": [ "kipa" ], "answer_start": [ 356 ] }