According to the CHFI v11 objectives underMobile and IoT ForensicsandOperating System Forensics, mobile devices often act ascross-platform interaction points, storing artifacts related to communications, file transfers, backups, or synchronization withWindows and Linux systems. These artifacts may include shared documents, SSH keys, SMB access traces, USB connection records, cloud sync remnants, or application logs indicating interaction with external operating systems.
A crucial forensic step in such cases isanalyzing files to identify interactions and potential evidence across different operating systems. This enables investigators to reconstruct user activity beyond the mobile device itself and establish links between the mobile device and other systems involved in the incident. CHFI v11 emphasizes the importance ofcorrelating evidence across heterogeneous platformsto build a complete and accurate timeline of events.
Focusing only on native mobile files (Options B and C) risks overlooking critical evidence that may demonstrate lateral movement, data exfiltration, or coordination between devices. Ignoring Windows- or Linux-related artifacts (Option D) directly contradicts forensic best practices and may lead to incomplete or flawed conclusions.
The CHFI Exam Blueprint v4 explicitly highlightsAndroid and iOS forensic analysis,cross-platform evidence correlation, andfile system analysisas key competencies. Therefore, analyzing cross-OS artifacts is essential for uncovering hidden relationships, validating investigative hypotheses, and ensuring legally defensible findings, making Option A the correct and exam-aligned answer
Submit