Question 2 of 10

What is the difference between a runbook and a playbook in a SOC environment, and why do SOC analysts rely on them during incident response?