Glossary

The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.

consistent

A term indicating that data is recoverable by the system or application using it; for example, a file system or database. In , a Secondary that is consistent can be used for takeover.

A term indicating that data is recoverable by the system or application using it; for example, a file system or database. A Secondary that is consistent can be used for takeover.