You use a feature on a stand-alone wireless printer that allows you to configure it as a hotspot enabling
nearby computers to connect to it. What limitation does this configuration pose?
It exposes connected computers to internet attacks.