*A: Isolate smart devices to their own network segment: Network segmentation using VLANs or separate SSIDs ensures that smart devices (like speakers) are not on the same network as guests, preventing unauthorized control. *E: Change the default credentials: Many IoT devices (e.g., smart speakers) come with default usernames and passwords. If these are not changed, unauthorized users can easily take control. *Why not the other options? *B: Configure IPS: IPS (Intrusion Prevention System) detects threats but cannot block specific guest actions on an IoT device. *C: Install a new AP: A new access point does not solve the unauthorized control issue. *D: Set up a syslog server: Helps with logging, but does not prevent unauthorized access. *F: Configure GRE: Generic Routing Encapsulation (GRE) is used for VPN tunneling, which is irrelevant in this case. Reference: CompTIA Network+ (N10-009) Official Guide - Chapter 11: Network Security