Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

EN0-001 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

EN0-001 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ARM Accredited Engineer
  • Last Update: Dec 14, 2024
  • Questions and Answers: 210
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

EN0-001 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

EN0-001 Practice Exam Questions with Answers ARM Accredited Engineer Certification

Question # 6

A Just-In-Time compiler writes instructions to a region of memory that is configured using a writeback cache strategy. For the locations that have been written, what is the MINIMUM cache maintenance that MUST be performed before the new instructions can be reliably executed?

A.

Instruction cache clean only

B.

Instruction cache invalidate only

C.

Data cache clean and instruction cache invalidate

D.

Data cache invalidate and instruction cache invalidate

Full Access
Question # 7

In an ARMv7-A processor with Security Extensions, which of the following mechanisms best describes the way Secure memory is protected from access by software running in a Non-secure privileged mode?

A.

The memory system has visibility of the security status of all accesses, and will reject all Non-secure accesses to Secure memory

B.

Secure memory contents are encrypted, and cannot be decrypted by Non-secure software

C.

The level 2 cache controller blocks all accesses to Secure memory when the SCR.NS bit of the processor is set

D.

The MMU generates an abort on accesses to Secure memory performed by Non-secure software

Full Access
Question # 8

What is the value of r0 after executing the following instruction sequence?

MOV r0, #200

MOV r5, #1

STR r3, [r0, r5, LSL#3]!

A.

200

B.

201

C.

204

D.

208

Full Access
Question # 9

Under which of the following data-sharing scenarios would cache maintenance operations be necessary?

A.

Sharing data with another thread running on the same core

B.

Sharing data with another process running on the same core

C.

Sharing data with an external device

D.

Sharing data with another CPU in an SMP system

Full Access
Question # 10

The Performance Monitoring Unit (PMU) of a Cortex-A9 processor permits direct measurement of which one of the following?

A.

Cache Size

B.

Clock Speed

C.

Program size

D.

Numbers of instructions executed

Full Access
Question # 11

In which TWO of the following locations would a compiler typically place local variables? (Choose two)

A.

ROM

B.

Heap

C.

Cache

D.

Registers

E.

Stack

Full Access
Question # 12

The Cortex-A9 processor implements a feature called "small loop mode" which reduces power consumption when executing small loops by turning off instruction cache accesses. Which of the following statements describes a condition that must be satisfied for this mode to be enabled?

A.

The loop must fit into two cache lines

B.

The loop must only contain forward branches

C.

Only integer arithmetic can be used

D.

All variables must be held in registers

Full Access
Question # 13

Which of the following is an accurate description of network storage as compared to on-chip RAM?

A.

It has lower capacity

B.

It is quicker to access

C.

It is always available

D.

It is easy to share with other devices

Full Access
Question # 14

Capturing processor execution trace is characterized as being:

A.

Influenced by breakpoints.

B.

Intrusive on normal processor operation.

C.

Inaccurate regarding code execution history.

D.

Not intrusive on normal processor operation.

Full Access
Question # 15

Which of the following will cause the ARM Compiler to target the Thumb instruction set?

A.

Compiling exception handlers

B.

Specifying a Thumb-capable processor (e.g. -cpu=Cortex-A9)

C.

Enabling Thumb code generation on the command line (--thumb)

D.

Configuring the compiler for maximum code density (-Ospace)

Full Access
Question # 16

Within the ARMv7 architecture, which one of the following features is unique to the ARMv7-A profile?

A.

Cache support

B.

Privileged execution

C.

The ARM instruction set

D.

Virtual memory support

Full Access
Question # 17

Which of the following register values would cause an unaligned access when the instruction LDRH r0, [r1] is executed?

A.

R0=0x100, R1 =0x1000

B.

R0=0x100, R1=0x1002

C.

R0=0x101, R1=0x1002

D.

R0=0x101. R1=0x1003

Full Access
Question # 18

A C code segment contains three calls to a function, foobar ().

This code segment is to be linked with a static library that defines foobar ().

Ignoring inlining, how many copies of foobar () will the ARM linker place in the output?

A.

None

B.

Always one

C.

Always three

D.

One or more depending on optimization level

Full Access
Question # 19

The automatic removal of a cache line from a cache to free the location is known as cache line:

A.

Coherency

B.

Pre-fetch

C.

Eviction

D.

Allocation

Full Access
Question # 20

Which TWO of the following interrupt types does a Generic Interrupt Controller (GIC) support? (Choose two)

A.

Interrupt from a private peripheral to a processor

B.

Interrupt from a processor to a private peripheral

C.

Interrupt from a shared peripheral to a processor

D.

Interrupt from a processor to a shared peripheral

E.

Interrupt from a private peripheral to a shared peripheral

F.

Interrupt from a shared peripheral to a private peripheral

Full Access
Question # 21

Which of the following operations would count as intrusive to normal processor operation?

A.

Tracing using Embedded Trace Macrocell (ETM)

B.

Halt mode debugging

C.

Monitor mode debugging

D.

Using the Performance Monitor Unit

Full Access
Question # 22

When using an Operating System, which of the following operations can NOT typically be done by user processes?

A.

Reading the link register (R14)

B.

Reading data from the user stack

C.

Changing from ARM state to Thumb state

D.

Changing the interrupt mask bits (A, I, F) in the CPSR

Full Access
Question # 23

Why does Device memory prohibit speculative accesses?

A.

Speculative accesses might waste energy

B.

Speculative accesses might reduce performance

C.

Speculative accesses might cause unwanted cache coherency traffic

D.

Speculative accesses might cause undesired system state changes

Full Access
Question # 24

Which one of the following statements best describes the function of vector catch logic?

A.

It traps writes to the memory containing the vector table

B.

It provides additional resources for debugging exception handlers

C.

It provides configurable exception priorities on an ARM processor

D.

It provides an improved mechanism for an application to handle exceptions

Full Access
Question # 25

Which of the following properties is a required characteristic of a Symmetric Multiprocessing (SMP) system?

A.

All processors have the same view of memory

B.

An even number of processors is included

C.

All processors run in the same power state

D.

All processors switch between operating system tasks in lock-step

Full Access
Question # 26

Which of the following would enable the use of a symmetric multiprocessing (SMP) operating system?

A.

A dual-core Cortex-A9 processor

B.

A Cortex-R4 processor with a Cortex-M3 system controller

C.

A Cortex-A8 processor with a graphics processing unit (GPU)

D.

A uni-core Cortex-A5 processor with a digital signal processor (DSP)

Full Access
Question # 27

Using a Generic Interrupt Controller (GIC), when the interrupt handler writes to the End of Interrupt Register (ICCEOIR), which of the following state transitions might occur for that interrupt ID?

A.

Inactive to Active

B.

Pending to Active

C.

Active to Inactive

D.

Active to Pending

Full Access
Question # 28

If a Generic Interrupt Controller (GIC) implements 64 priority levels, which priority field bits hold the priority value?

A.

bits [5:0]

B.

bits [7:2]

C.

bits [15:10]

D.

bits [31:26]

Full Access
Question # 29

A re-entrant interrupt handler would typically be used to:

A.

Allow an external interrupt to interrupt an SVC handler

B.

Reduce response time for higher priority interrupts

C.

Allow an interrupt handler to be relocated in memory

D.

Avoid the need for an interrupt handler to use a stack.

Full Access
Question # 30

What is the value of R2 after execution of the following instruction sequence?

MOV R3, #0xBA

MOV R2/#0x10

BIC R2, R3, R2

A.

R2 = 0xBB

B.

R2 = 0xCB

C.

R2 = 0xAA

D.

R2 = 0xCC

Full Access
Question # 31

When applied to locations in memory configured using a write-back cache strategy, what does a data cache 'clean' operation do?

A.

Writes dirty data cache lines to memory

B.

Reloads dirty data cache lines from memory

C.

Speculatively preloads data into the cache

D.

Writes dirty data cache lines to memory and marks those lines as invalid

Full Access
Question # 32

Cross compiling enables a programmer to:

A.

Produce a binary object that will run on processors based on any architecture.

B.

Mix different source languages within the same source file and compile with a single tool.

C.

Run code written for one processor on a processor based on a different architecture.

D.

Compile target code using a computer based on a different architecture.

Full Access
Question # 33

When using the Performance Monitoring Unit to count runtime events the counter registers are limited to 32-bits. How can more than 2A32 events be counted without significantly impacting the software performance?

A.

Register an interrupt which is triggered when the counter overflows

B.

Count the events using a 64-bit VFP register

C.

Allow one event type to use concatenated counter registers

D.

Poll the event counter, resetting it when the counter is close to overflowing

Full Access
Question # 34

Which of the following statements is TRUE with respect to the power consumption related to memory accesses?

A.

Accessing a large memory device consumes less power than accessing a small one

B.

A series of non-sequential accesses is more efficient than a series of sequential accesses

C.

Increasing the size of the cache will always reduce power consumption for a given application

D.

Storing frequently used data in Tightly Coupled Memory will reduce power consumption

Full Access
Question # 35

In which of the following situations would you use a mutex to avoid synchronization problems?

A.

A single-threaded application needs to manage two separate UART peripherals

B.

Two independent threads running on a single processor both need to access a single UART

C.

In a dual-core system, a UART is accessed by a single thread running on one of the processors

D.

In a dual-core system, processor A needs to access UART A and processor B needs to access UART B

Full Access
Question # 36

A deeply embedded real-time industrial control system is missing some hard real-time interrupt deadlines. Which of the following performance analysis techniques is the most suitable for identifying which routines are causing the problem?

A.

Use an ETM instruction trace profiler, which outputs information about the program as it runs

B.

Add some serial logging to the software, which outputs information about the program as it runs

C.

Add a new interrupt handler, which is triggered off a timer, and dump information about the interrupted process

D.

Use a JTAG sample-based profiler, which periodically halts the CPU, and dumps information about the interrupted process

Full Access
Question # 37

Assume a Big-Endian (BE) memory system with the following memory contents.

Byte Address Contents

0x100 0x11

0x101 0x22

0x102 0x33

0x103 0x44

If R5 = 0x100, what are the contents of R4 after performing the following operation?

LDR R4, [R5]

A.

0x11223344

B.

0x44332211

C.

0x22114433

D.

0x33441122

Full Access
Question # 38

Which one of these statements is TRUE about code running on final hardware without a debugger attached?

A.

It must start executing from RAM

B.

RAM must be initialized before reset

C.

Exception handlers must execute from ROM or flash memory

D.

It must not execute semihosting SVC or BKPT instructions

Full Access
Question # 39

A simple method of measuring the performance of an application is to record the execution time using the clock on the wall or a wristwatch.

When is this method INAPPROPRIATE?

A.

When executing the software using a simulation model

B.

When the processor is a Cortex-R4

C.

When instruction tracing is enabled

D.

When the processor is not executing instructions from cache

Full Access
Question # 40

The following C function is compiled with hard floating point linkage.

float function(int a, float b, int c, float d);

Which register is used to pass argument c?

A.

R0

B.

R1

C.

R2

D.

R3

Full Access
Question # 41

Which of the following features was added in version 2 of the ARM Architecture Advanced SIMD extensions?

A.

Additional quadword registers

B.

Support for double precision floating-point arithmetic

C.

Fused Multiply-Accumulate (Fused MAC) instructions

D.

Support for polynomials

Full Access
Question # 42

Which of the following functions can be performed by a spinlock?

A.

Encrypting sensitive data on a network

B.

Preventing interrupts from being received by a CPU

C.

Preventing unauthorized access to an ARM powered device

D.

Protecting a critical section or data structure from concurrent access

Full Access
Question # 43

Many ARM cores provide two instruction sets, ARM and Thumb. Which THREE of the following statements apply to the Thumb instruction set implemented for the ARMv7-A architecture? (Choose three)

A.

Thumb is a hybrid 16/32-bit instruction set

B.

No Thumb instructions can be conditionally executed

C.

Thumb code is always slower than the equivalent ARM code

D.

Some routines take more instructions in Thumb code than in the equivalent ARM code

E.

The Thumb instruction set can access the Advanced SIMD "NEON" instructions

F.

Thumb code is always more power-efficient than equivalent ARM code

Full Access
Question # 44

The following ARM instruction can be used to return from an exception:

movs pc, lr

Apart from the program counter, which register is updated by this instruction?

A.

Ir

B.

r0

C.

CPSR

D.

SCTLR

Full Access
Question # 45

To return from a Data Abort handler and re-execute the aborting instruction, what value should be loaded to the PC?

A.

PC=LR

B.

PC=LR44

C.

PC=LR-4

D.

PC=LR-8

Full Access
Question # 46

Which of the following is a REQUIRED feature in the ARMv7 architecture?

A.

The Thumb-2 instruction set

B.

NEON

C.

Integer division instructions

D.

A memory management unit

Full Access
Question # 47

Consider the following piece of code:

EN0-001 question answer

The value of r7 after execution of the above piece of code is:

A.

0xAA.

B.

0x00.

C.

0xBB.

D.

Unpredictable.

Full Access
Question # 48

The purpose of a translation lookaside buffer (TLB) is to:

A.

Protect memory.

B.

Improve performance.

C.

Implement virtual memory,

D.

Ensure correct ordering of memory operations.

Full Access
Question # 49

In the Generic Interrupt Controller (GIC), when an interrupt is requested, but is not yet being handled, it is in which of the following states?

A.

Inactive

B.

Active

C.

Pending

D.

Edge-triggered

Full Access
Question # 50

Which of the following processors includes a Generic Interrupt Controller as a standard component?

A.

Cortex-A8

B.

Cortex-M3

C.

Cortex-R4F

D.

Cortex-A9 MPCore

Full Access
Question # 51

In an ARMv7-A processor, with which level of the memory system is the Memory Management Unit (MMU) associated?

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Full Access
Question # 52

Implementing loops using a decrementing counter which exits the loop when a counter reaches zero can be beneficial for power and performance. This is because:

A.

A simpler branch instruction can be used.

B.

Decrementing variables uses less power than incrementing them.

C.

The decrement and branch operations can be encoded as a single instruction.

D.

The loop termination condition check can be integrated into the subtract operation.

Full Access
Question # 53

When debugging an embedded Linux system, which one of the following techniques can be used to halt a single user thread, while allowing other threads to continue to run during the debug process?

A.

Halting a single user thread in an embedded Linux system is not possible

B.

Use the Linux kernel printk() function to output messages to the console

C.

Connect a Linux-aware JTAG debugger to the target, which allows single-stepping of the code

D.

Connect a debugger running on an external host device to an instance of gdbserver running on the target, using Ethernet

Full Access
Question # 54

A program running on a development board that is connected to a host using a debugger can access a file on the host by using:

A.

Memory mapping

B.

Semihosting

C.

Polling

D.

Virtual I/O

Full Access
Question # 55

Which of the following is an external exception?

A.

Supervisor Call

B.

FIQ

C.

Undefined Instruction

D.

Parity

Full Access
Question # 56

An undefined instruction will cause an Undefined Instruction exception to be taken when:

A.

It is fetched.

B.

It is decoded.

C.

It is executed.

D.

It writes back its results.

Full Access
Question # 57

Processors which implement the ARMv7-A architecture can be configured to allow unaligned memory access. Unaligned accesses have a number of advantages, disadvantages, and limitations.

Which TWO of the following statements are true? (Choose two)

A.

Unaligned accesses may take more cycles to execute than aligned accesses

B.

Unaligned loads and stores are necessary for accessing fields in packed structures

C.

A program compiled using unaligned accesses can be safely executed on all ARMv7-A devices

D.

If the relevant control register setting is enabled all loads and stores can function from unaligned addresses

E.

Unaligned accesses can only be made to Normal memory

Full Access
Question # 58

In which of the following scenarios would cache maintenance operations be necessary in an ARMv7 system?

A.

Before executing code that uses the NEON instruction set

B.

Before handling an interrupt request raised by an external device

C.

Before checking the status of a semaphore

D.

Before reading cacheable memory that has been written to by an external bus master

Full Access
Question # 59

A Programmer's View CPU model usually provides:

A.

Cycle-accurate simulation of the CPU.

B.

Instruction-accurate simulation of the CPU.

C.

Simulation of user-defined memory-mapped peripherals.

D.

Cycle-accurate simulation of the cache and memory system.

Full Access
Question # 60

When setting the initial location of the stack pointer and the base address of the heap, the ARM EABI requires that the:

A.

Base address of the heap must be the same as the initial stack pointer.

B.

Stack pointer must be 8-byte aligned.

C.

Heap must be in external RAM.

D.

Initial stack pointer must be the lowest addressable memory location.

Full Access
Question # 61

A 32KB 4-way set associative instruction cache supports a cache line size of 64 bytes. How many bits are required to index a cache line in a way?

A.

6 bits

B.

7 bits

C.

9 bits

D.

15 bits

Full Access
Question # 62

An Advanced SIMD intrinsic has the prototype:

int16x4_t vmul_n_s16(int16x4_t a, int16_t b);

How many multiplications does this intrinsic compute?

A.

1 multiplication

B.

4 multiplications

C.

16 multiplications

D.

64 multiplications

Full Access
Question # 63

The size of a C 'int' type in the ARM architecture is:

A.

8 bits

B.

16 bits

C.

32 bits

D.

64 bits

Full Access