ultraviolate39581 ultraviolate39581 07-10-2022 Computers and Technology Answered a security analyst's scans and network logs show that unauthorized devices are connecting to the network. the analyst discovers a tethered smartphone acting as a connection point to the network. which behavior describes the smartphone's role?