A company's IT policies require that any wireless access for non-employees must be strictly controlled and monitored. As the network administrator, you have been tasked with configuring the wireless access point to align with this policy. What is the most effective action to take that allows for occasional, secure guest use without providing continuous open access?
Implement MAC address filtering to allow only pre-approved devices to access the network.
Increase the Wi-Fi encryption level, which requires more complex passwords for guest access.
Enable a guest network with its own authentication mechanism that is separate from the internal network.
Disable the DHCP server to prevent unauthorized devices from obtaining an IP address.