stephenmartin6200 stephenmartin6200 Today at 6:31 PM Computers and Technology Answered A security analyst's scans and network logs show that unauthorized devices are connecting to the network. The analyst discovers a tethered smartphone acting as a connection point to the network. Which behavior describes the smartphone's role?