Ultraviolate39581go Ultraviolate39581go Computers and Technology Answered a security analyst's scans and network logs show that unauthorized devices are connecting to the network. the analyst discovers a tethered smartphone acting as a connection point to the network. which behavior describes the smartphone's role?