stephenmartin6200 stephenmartin6200 19-08-2022 Computers and Technology contestada A security analyst's scans and network logs show that unauthorized devices are connecting to the network. The analyst discovers a tethered smartphone acting as a connection point to the network. Which behavior describes the smartphone's role?