Answer: (A) Guests should log into a separate wireless network using a captive portal
Step-by-step explanation:
As the network engineer is configuring a wireless access and it does not want the guest access to other areas in the organization so in order to check that a separate wireless network should be there and the guest are to log into that network. Upon logging into that there should be a captive portal through which they could access the internet.
Using the captive portal which is a web page asking for the guest its username and password the organisation is able to keep tack of the sites the guest visits and on its activities. More over having a captive portal ensure the organization that they are authorized guest to access the site.
This captive portal also hides access to certain areas of the organisation which the admin does not want. So altogether in this way it is the most secure method to configure guest access to wireless network.