IDNLearn.com offers a reliable platform for finding accurate and timely answers. Get accurate answers to your questions from our community of experts who are always ready to provide timely and relevant solutions.

a security analyst's scans and network logs show that unauthorized devices are connecting to the network. the analyst discovers a tethered smartphone acting as a connection point to the network. which behavior describes the smartphone's role?