__________________ playbooks contain detailed step-by-step instructions that guide the early response to a cybersecurity incident.
a. Ensuring all affected systems are isolated from the network
b. Notifying the appropriate law enforcement agencies
c. Conducting a thorough investigation to determine the cause of the incident
d. Implementing measures to prevent similar incidents in the future