id stringlengths 24 24 | title stringclasses 442
values | context stringlengths 151 3.71k | question stringlengths 1 25.7k | answers dict |
|---|---|---|---|---|
5a5546d5134fea001a0e1a0f | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What can an attacker install to your computer in order to collect personal data? | {
"text": [],
"answer_start": []
} |
5a5546d5134fea001a0e1a10 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What can infect other computers from your own? | {
"text": [],
"answer_start": []
} |
5a5cb9315e8782001a9d5d82 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What can an authorized user with access to a computer do? | {
"text": [],
"answer_start": []
} |
5a5cb9315e8782001a9d5d83 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | How are computers made secure? | {
"text": [],
"answer_start": []
} |
5a5cb9315e8782001a9d5d84 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What does CD-ROM stand for? | {
"text": [],
"answer_start": []
} |
5a5cb9315e8782001a9d5d85 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What is the name of a program designed to attack a computer? | {
"text": [],
"answer_start": []
} |
5a5cb9315e8782001a9d5d86 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | How does a user bypass a compromised security? | {
"text": [],
"answer_start": []
} |
5709a8dd200fba140036822b | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | UI redress attack or User Interface redress attack is also known as what? | {
"text": [
"Clickjacking"
],
"answer_start": [
0
]
} |
5709a8dd200fba140036822c | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What is a malicious technique in which an attacker tricks the user into clicking on a button or link? | {
"text": [
"Clickjacking"
],
"answer_start": [
0
]
} |
5709a8dd200fba140036822d | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where are the clicks meant for the top level page routed? | {
"text": [
"some other irrelevant page"
],
"answer_start": [
407
]
} |
5709a8dd200fba140036822e | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where would a password typed on a seemingly authetic webpage be directed? | {
"text": [
"into an invisible frame controlled by the attacker"
],
"answer_start": [
748
]
} |
5709a8dd200fba140036822f | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | How istricking the user accomplished in clickjacking? | {
"text": [
"using multiple transparent or opaque layers"
],
"answer_start": [
264
]
} |
5a5551b9134fea001a0e1a20 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What is intended to be hijacked through a page overlay? | {
"text": [],
"answer_start": []
} |
5a5551b9134fea001a0e1a21 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What else can be hijacked through UI redress? | {
"text": [],
"answer_start": []
} |
5a5551b9134fea001a0e1a22 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What part of a webpage is meant to collect keystrokes? | {
"text": [],
"answer_start": []
} |
5a5551b9134fea001a0e1a23 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Why can the user not see the other page used by the attacker? | {
"text": [],
"answer_start": []
} |
5a5551b9134fea001a0e1a24 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where is are the passwords and information stored by the attacker? | {
"text": [],
"answer_start": []
} |
5a5cbc6f5e8782001a9d5d96 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What is avoiding a UI redress attack called? | {
"text": [],
"answer_start": []
} |
5a5cbc6f5e8782001a9d5d97 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | How are clicks routed back to the top level page? | {
"text": [],
"answer_start": []
} |
5a5cbc6f5e8782001a9d5d98 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | How is an legitimate webpage created? | {
"text": [],
"answer_start": []
} |
5a5cbc6f5e8782001a9d5d99 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What is another name for hijacking keystrokes? | {
"text": [],
"answer_start": []
} |
5a5cbc6f5e8782001a9d5d9a | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where is a user redirected to after putting in their password? | {
"text": [],
"answer_start": []
} |
5709a976ed30961900e843da | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | How many computers were connected to the internet in 1988? | {
"text": [
"60,000"
],
"answer_start": [
14
]
} |
5709a976ed30961900e843db | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | When was the first computer worm released? | {
"text": [
"November 2, 1988"
],
"answer_start": [
137
]
} |
5709a976ed30961900e843dc | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Who was the first computer worm traced back to? | {
"text": [
"Robert Tappan Morris, Jr."
],
"answer_start": [
414
]
} |
5709a976ed30961900e843dd | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | What is a malicious code that demands processor time and spreads itself to other computers? | {
"text": [
"computer worm"
],
"answer_start": [
318
]
} |
5709a976ed30961900e843de | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Why did Morris Jr make the computer worm? | {
"text": [
"he wanted to count how many machines were connected to the Internet"
],
"answer_start": [
450
]
} |
5a557057134fea001a0e1a82 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | What types of computers were connected to the internet in 1988? | {
"text": [],
"answer_start": []
} |
5a557057134fea001a0e1a83 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | On Nov 2, 1988 what caused many computers to slow down? | {
"text": [],
"answer_start": []
} |
5a557057134fea001a0e1a84 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | When was the first computer worm? | {
"text": [],
"answer_start": []
} |
5a557057134fea001a0e1a85 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Who created the first computer worm? | {
"text": [],
"answer_start": []
} |
5a557057134fea001a0e1a86 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | How old was the Cornell University Grad Student who created the worm? | {
"text": [],
"answer_start": []
} |
5a5ce0995e8782001a9d5dfa | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | How many computers began to slow down on Nov. 2, 1988? | {
"text": [],
"answer_start": []
} |
5a5ce0995e8782001a9d5dfb | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Who tracked down the first computer worm? | {
"text": [],
"answer_start": []
} |
5a5ce0995e8782001a9d5dfc | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | When was the computer worm caught? | {
"text": [],
"answer_start": []
} |
5a5ce0995e8782001a9d5dfd | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Where was the computer worm created? | {
"text": [],
"answer_start": []
} |
5a5ce0995e8782001a9d5dfe | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Which internet connected computers slowed down? | {
"text": [],
"answer_start": []
} |
5709aa1f200fba1400368235 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Who are Rescator? | {
"text": [
"a Russian/Ukrainian hacking ring"
],
"answer_start": [
18
]
} |
5709aa1f200fba1400368236 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | What was stolen from Target Corporation computers in 2013? | {
"text": [
"40 million credit cards"
],
"answer_start": [
137
]
} |
5709aa1f200fba1400368237 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | How many credit card numbers were stole from Home Depot in 2014? | {
"text": [
"between 53 and 56 million"
],
"answer_start": [
210
]
} |
5709aa1f200fba1400368238 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | What machines were involved in the physical security breaches that played a large role in the incident? | {
"text": [
"self checkout machines"
],
"answer_start": [
349
]
} |
5709aa1f200fba1400368239 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Who is Jim Walter? | {
"text": [
"director of threat intelligence operations at security technology company McAfee"
],
"answer_start": [
503
]
} |
5a55742a134fea001a0e1a96 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | What was done when credit cards were stolen? | {
"text": [],
"answer_start": []
} |
5a55742a134fea001a0e1a97 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | What was the main breach? | {
"text": [],
"answer_start": []
} |
5a55742a134fea001a0e1a98 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Who could have easily stopped the hacking? | {
"text": [],
"answer_start": []
} |
5a55742a134fea001a0e1a99 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Unsophisticated malware was used on what? | {
"text": [],
"answer_start": []
} |
5a55742a134fea001a0e1a9a | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Why was the malware uninteresting? | {
"text": [],
"answer_start": []
} |
5a5ce6645e8782001a9d5e0e | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Who was the leader of Rescator? | {
"text": [],
"answer_start": []
} |
5a5ce6645e8782001a9d5e0f | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | What was stolen from McAfee? | {
"text": [],
"answer_start": []
} |
5a5ce6645e8782001a9d5e10 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | When was the investigation concluded? | {
"text": [],
"answer_start": []
} |
5a5ce6645e8782001a9d5e11 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | Why weren't the companies warned about the threat? | {
"text": [],
"answer_start": []
} |
5a5ce6645e8782001a9d5e12 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; phys... | When was Rescator formed? | {
"text": [],
"answer_start": []
} |
5709aacc200fba140036823f | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What does NCAZ stand for? | {
"text": [
"Nationales Cyber-Abwehrzentrum"
],
"answer_start": [
179
]
} |
5709aacc200fba1400368240 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What does NCAZ take care of? | {
"text": [
"national security aspects"
],
"answer_start": [
622
]
} |
5709aacc200fba1400368241 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | When was NCAZ opened? | {
"text": [
"June 16, 2011"
],
"answer_start": [
52
]
} |
5709aacc200fba1400368242 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Whan was NCAZ founded? | {
"text": [
"February 23, 2011"
],
"answer_start": [
727
]
} |
5709aacc200fba1400368243 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What is the purpose of NCAZ? | {
"text": [
"to detect and prevent attacks against the national infrastructure"
],
"answer_start": [
749
]
} |
5a557a6e134fea001a0e1adc | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Why does Berlin start a National Cyber Defense Initiative? | {
"text": [],
"answer_start": []
} |
5a557a6e134fea001a0e1add | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Why does NCAZ work closely with BSI? | {
"text": [],
"answer_start": []
} |
5a557a6e134fea001a0e1ade | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Who takes care of national security? | {
"text": [],
"answer_start": []
} |
5a557a6e134fea001a0e1adf | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What incidents are it to prevent? | {
"text": [],
"answer_start": []
} |
5a557a6e134fea001a0e1ae0 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What was the Stuxnet incident? | {
"text": [],
"answer_start": []
} |
5a5d037f5e8782001a9d5e5c | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Where is the German Minister for Home Affairs located? | {
"text": [],
"answer_start": []
} |
5a5d037f5e8782001a9d5e5d | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | When did the incident in Stuxnet happen? | {
"text": [],
"answer_start": []
} |
5a5d037f5e8782001a9d5e5e | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Where is the BSI located? | {
"text": [],
"answer_start": []
} |
5a5d037f5e8782001a9d5e5f | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | Who opened the BDN? | {
"text": [],
"answer_start": []
} |
5a5d037f5e8782001a9d5e60 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für ... | What is the primary task of the Minister for Home Affairs? | {
"text": [],
"answer_start": []
} |
57097eaced30961900e84218 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What is the approach to Judiasm that subscribes to a tradition of mass revelation? | {
"text": [
"Orthodox"
],
"answer_start": [
0
]
} |
57097eaced30961900e84219 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What is the name of the book that has the laws and ethics for Orthodox Judaism? | {
"text": [
"Torah"
],
"answer_start": [
185
]
} |
57097eaced30961900e8421a | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | what texts were legislated by the Tanarim and Amoraim? | {
"text": [
"Talmudic"
],
"answer_start": [
212
]
} |
57097eaced30961900e8421b | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What besides Modern Orthodox Judaism does Orthodox Judaism consist of? | {
"text": [
"Haredi Judaism"
],
"answer_start": [
478
]
} |
57097eaced30961900e8421c | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | Orthodox Judaism is a self-identification that distinguishes it from what? | {
"text": [
"pre-modern Judaism"
],
"answer_start": [
777
]
} |
5a578a88770dc0001aeefc62 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What is Orthodox Christianity a religion that subscribes to? | {
"text": [],
"answer_start": []
} |
5a578a88770dc0001aeefc63 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What does Orthodox Christianity adhere to? | {
"text": [],
"answer_start": []
} |
5a578a88770dc0001aeefc64 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | Who is the Bible legislated by? | {
"text": [],
"answer_start": []
} |
5a578a88770dc0001aeefc65 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | Where will you not find Modern Judaism? | {
"text": [],
"answer_start": []
} |
5a578a88770dc0001aeefc66 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later autho... | What is a religion with a single philosophy? | {
"text": [],
"answer_start": []
} |
57097f32ed30961900e84222 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | What is the global Jewish news service known as? | {
"text": [
"JTA"
],
"answer_start": [
164
]
} |
57097f32ed30961900e84223 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | What is New Jersey's largest daily paper? | {
"text": [
"the Star-Ledger"
],
"answer_start": [
205
]
} |
57097f32ed30961900e84224 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | What term do media entities refrain from using? | {
"text": [
"\"ultra-Orthodox"
],
"answer_start": [
98
]
} |
57097f32ed30961900e84225 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | Who is the spiritual leader of Temple Israel Community Center? | {
"text": [
"Rabbi Shammai Engelmayer"
],
"answer_start": [
474
]
} |
57097f32ed30961900e84226 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | Where is the Temple Israel Community Center located? | {
"text": [
"Cliffside Park"
],
"answer_start": [
554
]
} |
5a578a9d770dc0001aeefc6c | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | What did the New England press association claim? | {
"text": [],
"answer_start": []
} |
5a578a9d770dc0001aeefc6d | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | How large is the global Jewish news service? | {
"text": [],
"answer_start": []
} |
5a578a9d770dc0001aeefc6e | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | The Religion Newswriters Association was the first news source to drop what name? | {
"text": [],
"answer_start": []
} |
5a578a9d770dc0001aeefc6f | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | What is a New York paper still using the term ultra-orthodox? | {
"text": [],
"answer_start": []
} |
5a578a9d770dc0001aeefc70 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop t... | Who was the executive editor of the Star-Ledger? | {
"text": [],
"answer_start": []
} |
5709806e200fba14003680a5 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What is the name of the movement that comporises a fairly broad spectrum of distinct but related philosophies? | {
"text": [
"Modern Orthodoxy"
],
"answer_start": [
0
]
} |
5709806e200fba14003680a6 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What integrity is orthodox judaism trying to preserve? | {
"text": [
"halakha"
],
"answer_start": [
675
]
} |
5709806e200fba14003680a7 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | Who does Modern Orthodoxy assign a central role to? | {
"text": [
"People of Israel"
],
"answer_start": [
847
]
} |
5709806e200fba14003680a8 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What kind of work does orthodox Judiasm seek to transform the world with? | {
"text": [
"Divine work"
],
"answer_start": [
559
]
} |
5709806e200fba14003680a9 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What is modern cutlture in conflict with? | {
"text": [
"Torah"
],
"answer_start": [
742
]
} |
5a57b8de770dc0001aeefcf0 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What comprises a fairly narrow spectrum of movements? | {
"text": [],
"answer_start": []
} |
5a57b8de770dc0001aeefcf1 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What are distinct and non-related in Modern Orthodoxy? | {
"text": [],
"answer_start": []
} |
5a57b8de770dc0001aeefcf2 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What does Classical Orthodoxy hold to be true? | {
"text": [],
"answer_start": []
} |
5a57b8de770dc0001aeefcf3 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | What can Orthodox Judaism be harmed by it's interaction with? | {
"text": [],
"answer_start": []
} |
5a57b8de770dc0001aeefcf4 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously att... | Who do Modern Orthodoxy assign a non-central role to? | {
"text": [],
"answer_start": []
} |
570980f2200fba14003680c1 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth... | How do orthodox women dress mosly? | {
"text": [
"covered"
],
"answer_start": [
151
]
} |
570980f2200fba14003680c2 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth... | what part of their body do married women cover with a scarf? | {
"text": [
"hair"
],
"answer_start": [
200
]
} |
570980f2200fba14003680c3 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orth... | What is the Skullcap that orthodox men wear known as? | {
"text": [
"kipa"
],
"answer_start": [
356
]
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.