Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

EN0-001 Sample Questions Answers

Questions 4

Is it possible to use an interrupt controller based on the Generic Interrupt Controller (GIC) architecture in a device built around a single core Cortex-A9 MPCore processor?

Options:

A.

No, they are completely incompatible

B.

Yes, all Cortex-A9 MPCore processors include an integrated GIC

C.

Yes, but a dummy second processor has to be included

D.

No, a GIC is only compatible with multi-core Cortex-A9 processors

Buy Now
Questions 5

Which of the following is an accurate description of network storage as compared to on-chip RAM?

Options:

A.

It has lower capacity

B.

It is quicker to access

C.

It is always available

D.

It is easy to share with other devices

Buy Now
Questions 6

In an MPCore system, when one core is waiting for resources to be released, what instruction could be used to reduce that core's power consumption?

Options:

A.

WFE

B.

PLD

C.

NOP

D.

DSB

Buy Now
Questions 7

In a single-processor system, which of these operations requires a barrier instruction to guarantee correct operation?

Options:

A.

Copying data from Flash to RAM

B.

Changing from one privileged mode to another

C.

Loading code into memory and then executing it

D.

Incrementing a RAM location that will be read by an interrupt handler

Buy Now
Questions 8

Using a Generic Interrupt Controller (GIC), when the interrupt handler writes to the End of Interrupt Register (ICCEOIR), which of the following state transitions might occur for that interrupt ID?

Options:

A.

Inactive to Active

B.

Pending to Active

C.

Active to Inactive

D.

Active to Pending

Buy Now
Questions 9

In an ARMv7-A processor that includes the Advanced SIMD extension (NEON), where are the data values operated on by NEON instructions stored?

Options:

A.

In system memory

B.

In registers shared with the VFP register set

C.

In registers shared with the integer register set

D.

In dedicated registers not shared with other registers

Buy Now
Questions 10

The following pair of functions implement a simple mutex spinlock which might be used to protect a critical code section in a multi-threaded application. The address of the lock variable is in r0.

In order to minimize power while waiting for the lock to be available. SEV and WFE instructions can be used to place the processor in a low power state while waiting for the lock to become available. At which points should these instructions be placed?

Questions 11

LDREX and STREX were introduced in which ARM architecture version?

Options:

A.

ARMv5TE

B.

ARMv6

C.

ARMv6K

D.

ARMv7

Buy Now
Questions 12

Which of the following register values would cause an unaligned access when the instruction LDRH r0, [r1] is executed?

Options:

A.

R0=0x100, R1 =0x1000

B.

R0=0x100, R1=0x1002

C.

R0=0x101, R1=0x1002

D.

R0=0x101. R1=0x1003

Buy Now
Questions 13

A deeply embedded real-time industrial control system is missing some hard real-time interrupt deadlines. Which of the following performance analysis techniques is the most suitable for identifying which routines are causing the problem?

Options:

A.

Use an ETM instruction trace profiler, which outputs information about the program as it runs

B.

Add some serial logging to the software, which outputs information about the program as it runs

C.

Add a new interrupt handler, which is triggered off a timer, and dump information about the interrupted process

D.

Use a JTAG sample-based profiler, which periodically halts the CPU, and dumps information about the interrupted process

Buy Now
Questions 14

In an ARMv7 processor that includes the Advanced SIMD (NEON) extension, how many single precision floating point values can be stored in the Q0 register?

Options:

A.

1

B.

2

C.

4

D.

8

Buy Now
Questions 15

A message passing system between two CPUs is implemented using data stored in a shared area of memory. To pass a message, the first CPU executes the instructions:

The second CPU receives the message using the instructions:

On both CPUs, r1 = 0x5000 and r2 = 0x6000. At which of the points A, B, C and D must Data Memory Barrier (DMB) instructions be placed in order to ensure messages are passed reliably and efficiently?

Options:

A.

A only

B.

C only

C.

B and C

D.

A and D

Buy Now
Questions 16

Which of the following best describes the relationship between Tightly Coupled Memories (TCM), Level 1 (L1) and Level 2 (L2) cache memory systems?

Options:

A.

TCMs are a part of only L1 cache system

B.

TCMs are a part of only L2 cache system

C.

TCMs are part of both L1 & L2 cache systems

D.

TCMs are not part of either L1 or L2 cache systems

Buy Now
Questions 17

A function written in C has the prototype:

void my_function(float a. double b, float c);

The function is built and linked into an application using hard floating-point linkage. What registers are used to pass arguments to the function?

Options:

A.

a->s0; b->d0; c->s1

B.

a->s0; b->d1; c->s1

C.

a->d0; b->d1; c->d2

D.

a->s0; b->d1; c-> s2

Buy Now
Questions 18

In a Cortex-A processor, assume an initial value of R1 =0x80004000.

If the following instruction causes a data abort, what value will R1 contain on entry to the abort handler?

LDR R0, [R1, #8]!

Options:

A.

0x80003FF8

B.

0x80004000

C.

0x80004008

D.

R1 contents are unpredictable

Buy Now
Questions 19

Assuming a 4-core Cortex-A9 SMP system which does not use the Accelerator Coherency Port (ACP). and operates the L1 caches in writeback mode, in which of the following situations is a cache clean operation required?

Options:

A.

An external DMA engine modifies data in a region of data memory which is already cached by the processor

B.

An external agent needs to read data which has been modified by the processor in a cacheable memory region

C.

Debugger reads data from a shared, cacheable memory location

D.

One core modifies data in a shared cacheable memory region

Buy Now
Questions 20

In the VFPv4-D32 architecture, which of the following best describes the arrangement of the registers?

Options:

A.

D0..D31 and S0..S31 are separate register banks

B.

D0..D31 overlap with S0..S63

C.

D0..D15 overlap with S0..S31, and D16..D31 do not overlap with any single-precision registers

D.

D0 overlaps with S0, D1 with S1 etc. up to D31 and S31

Buy Now
Questions 21

Which of the following instructions can be used to enter a power saving mode?

Options:

A.

PLD

B.

PLI

C.

WFE

D.

DSB

Buy Now
Questions 22

Which power mode describes the state where the ARM processor is powered down, but its Level 1 caches remain powered?

Options:

A.

Run mode

B.

Dormant mode

C.

Standby mode

D.

Shutdown mode

Buy Now
Questions 23

Which ARMv7 instructions are recommended to implement a semaphore?

Options:

A.

SWP, SWPB

B.

TEQ, TST

C.

STC, SBC

D.

LDREX, STREX

Buy Now
Questions 24

In general, when programming in C, stack accesses will be reduced by:

Options:

A.

Disabling inlining.

B.

Never passing more than four parameters in function calls.

C.

Declaring automatic variables as "packed".

D.

Configuring the compiler to optimize for space.

Buy Now
Questions 25

Which TWO of the following interrupt types does a Generic Interrupt Controller (GIC) support? (Choose two)

Options:

A.

Interrupt from a private peripheral to a processor

B.

Interrupt from a processor to a private peripheral

C.

Interrupt from a shared peripheral to a processor

D.

Interrupt from a processor to a shared peripheral

E.

Interrupt from a private peripheral to a shared peripheral

F.

Interrupt from a shared peripheral to a private peripheral

Buy Now
Questions 26

Which of the following is an external exception?

Options:

A.

Supervisor Call

B.

FIQ

C.

Undefined Instruction

D.

Parity

Buy Now
Questions 27

Which of the following is preserved in dormant mode?

Options:

A.

Core register contents

B.

CP15 (system) register settings

C.

Debug state

D.

Cache contents

Buy Now
Questions 28

Which of the following techniques can be used to obtain a precise count of clock cycles when profiling software over an arbitrarily long period of time using the Performance Monitoring Unit?

Options:

A.

A dedicated real-time clock to provide the total cycle count

B.

Use of the divide-by 64 counting option to avoid an overflow of the cycle counter

C.

Use of the overflow interrupts, to extend the range of the built-in 32-bit counter

D.

Modification of the application software being profiled, to insert timestamps at regular intervals

Buy Now
Questions 29

Which one of the following features must any processor support to conform to the ARMv7-A architecture?

Options:

A.

NEON (Advanced SIMD)

B.

Thumb-2 technology

C.

TrustZone (Security Extensions)

D.

Generic Interrupt Controller

Buy Now
Questions 30

Which of the following is a REQUIRED feature in the ARMv7 architecture?

Options:

A.

The Thumb-2 instruction set

B.

NEON

C.

Integer division instructions

D.

A memory management unit

Buy Now
Questions 31

In an experiment, the time taken for an application to complete a given task is measured using a stopwatch. Which THREE of the following make up the total time? (Choose three)

Options:

A.

The time spent waiting for I/O operations

B.

The time taken to download the program via the debugger

C.

The time taken for memory accesses

D.

The time taken for the CPU to execute instructions

E.

The time taken to compile the source code

F.

The time taken to perform instruction tracing

Buy Now
Questions 32

The disassembly of a program written in C shows calls to the function__aeabi_fadd. Which one of these compiler floating point options could have been used?

Options:

A.

Hard floating-point linkage

B.

Soft floating-point linkage without floating-point hardware

C.

Hard floating-point linkage with optimization for space

D.

Soft floating-point linkage with floating-point hardware

Buy Now
Questions 33

The Cortex-A9 processor has 6 breakpoint units and 4 watchpoint units. What is the maximum number of breakpoints the debugger can set on code in ROM?

Options:

A.

6

B.

10

C.

2

D.

The debugger can use the BKPT instruction to do this.

Buy Now
Questions 34

A program running on a development board that is connected to a host using a debugger can access a file on the host by using:

Options:

A.

Memory mapping

B.

Semihosting

C.

Polling

D.

Virtual I/O

Buy Now
Questions 35

When programming in C, how many bytes of stack are needed to pass parameters when calling the following function?

int foo( int arg_a, int arg_b, int arg_c )

Options:

A.

0

B.

4

C.

8

D.

12

Buy Now
Questions 36

A C code segment contains three calls to a function, foobar ().

This code segment is to be linked with a static library that defines foobar ().

Ignoring inlining, how many copies of foobar () will the ARM linker place in the output?

Options:

A.

None

B.

Always one

C.

Always three

D.

One or more depending on optimization level

Buy Now
Questions 37

In an ARMv7-A processor with Security Extensions, which of the following mechanisms best describes the way Secure memory is protected from access by software running in a Non-secure privileged mode?

Options:

A.

The memory system has visibility of the security status of all accesses, and will reject all Non-secure accesses to Secure memory

B.

Secure memory contents are encrypted, and cannot be decrypted by Non-secure software

C.

The level 2 cache controller blocks all accesses to Secure memory when the SCR.NS bit of the processor is set

D.

The MMU generates an abort on accesses to Secure memory performed by Non-secure software

Buy Now
Questions 38

Under which of the following data-sharing scenarios would cache maintenance operations be necessary?

Options:

A.

Sharing data with another thread running on the same core

B.

Sharing data with another process running on the same core

C.

Sharing data with an external device

D.

Sharing data with another CPU in an SMP system

Buy Now
Questions 39

Which of the following memory attributes, specified in a translation table entry, could be used to protect a page containing a read-sensitive peripheral from speculative instruction fetches?

Options:

A.

S (Secure)

B.

nG (non-Global)

C.

xN (Execute Never)

D.

AP (Access Permission)

Buy Now
Questions 40

Which of the following statements regarding Strongly-ordered memory is architecturally FALSE?

Options:

A.

Address locations marked as Strongly-ordered memory are never held in a cache

B.

The architecture does not permit speculative data accesses to Strongly-ordered memory

C.

A write to Strongly-ordered memory is permitted to complete before it reaches the peripheral or memory component accessed by the write

D.

The number and size of accesses to Strongly-ordered memory must be the same as that specified by the program

Buy Now
Questions 41

In a Cortex-A processor, after which TWO of these events is a cache maintenance operation required to ensure reliable code execution? (Choose two)

Options:

A.

Processor reset

B.

Switching from ARM to Thumb state

C.

Changing the access permissions of a page

D.

Executing a Data Memory Barrier instruction

E.

Loading data from an unaligned memory address

Buy Now
Questions 42

In which of these cases would code have better performance when compiled for Thumb state than when compiled for ARM state?

Options:

A.

When the processor has no data cache

B.

When the code involves many shifting operations

C.

When the code has many conditionally executed instructions

D.

When the processor can only fetch instructions 16-bits at a time

Buy Now
Questions 43

An application contains three calls to an external function, foobar(), which is defined in a shared (or dynamic) library. How many copies of foobar() will the linker place in the application image?

(Ignore linker inlining)

Options:

A.

None

B.

Always one

C.

Always three

D.

One or more depending on optimization level

Buy Now
Questions 44

In an operating system environment, most applications are executed in which processor mode?

Options:

A.

Supervisor

B.

IRQ

C.

System

D.

User

Buy Now
Questions 45

When a linker is removing unused sections during a static link (for example, -remove or -gc-sections), it finds the sections to keep by following all relocations starting from:

Options:

A.

The entry point(s).

B.

The function named 'main'.

C.

All local functions and variables.

D.

The reset vector.

Buy Now
Questions 46

Which of the following sequences of stages comprise the ARM7TDMI three-stage pipeline?

Options:

A.

Fetch, Decode, Execute

B.

Decode, Fetch, Execute

C.

Execute, Fetch, Decode

D.

Fetch, Execute, Execute

Buy Now
Questions 47

In which of the following situations would you use a mutex to avoid synchronization problems?

Options:

A.

A single-threaded application needs to manage two separate UART peripherals

B.

Two independent threads running on a single processor both need to access a single UART

C.

In a dual-core system, a UART is accessed by a single thread running on one of the processors

D.

In a dual-core system, processor A needs to access UART A and processor B needs to access UART B

Buy Now
Questions 48

Assume a Big-Endian (BE) memory system with the following memory contents.

Byte Address Contents

0x100 0x11

0x101 0x22

0x102 0x33

0x103 0x44

If R5 = 0x100, what are the contents of R4 after performing the following operation?

LDR R4, [R5]

Options:

A.

0x11223344

B.

0x44332211

C.

0x22114433

D.

0x33441122

Buy Now
Questions 49

Cross compiling enables a programmer to:

Options:

A.

Produce a binary object that will run on processors based on any architecture.

B.

Mix different source languages within the same source file and compile with a single tool.

C.

Run code written for one processor on a processor based on a different architecture.

D.

Compile target code using a computer based on a different architecture.

Buy Now
Questions 50

An undefined instruction will cause an Undefined Instruction exception to be taken when:

Options:

A.

It is fetched.

B.

It is decoded.

C.

It is executed.

D.

It writes back its results.

Buy Now
Questions 51

Printf statements could be used to achieve which of the following debug tasks?

Options:

A.

Observe changes to a local variable in a function

B.

Capture a real-time trace of program execution

C.

Debug boot code, before a call to the C main() function

D.

Stop the processor at an interesting location in the code

Buy Now
Questions 52

Which of the following will cause the ARM Compiler to target the Thumb instruction set?

Options:

A.

Compiling exception handlers

B.

Specifying a Thumb-capable processor (e.g. -cpu=Cortex-A9)

C.

Enabling Thumb code generation on the command line (--thumb)

D.

Configuring the compiler for maximum code density (-Ospace)

Buy Now
Questions 53

Which one of these statements is TRUE about code running on final hardware without a debugger attached?

Options:

A.

It must start executing from RAM

B.

RAM must be initialized before reset

C.

Exception handlers must execute from ROM or flash memory

D.

It must not execute semihosting SVC or BKPT instructions

Buy Now
Questions 54

When applied to locations in memory configured using a write-back cache strategy, what does a data cache 'clean' operation do?

Options:

A.

Writes dirty data cache lines to memory

B.

Reloads dirty data cache lines from memory

C.

Speculatively preloads data into the cache

D.

Writes dirty data cache lines to memory and marks those lines as invalid

Buy Now
Questions 55

Consider the following code sequence, executing on a processor which implements ARM Architecture v7-A.

LDR r0, [r1]

STR r0, [r2]

STR r3, [r3]

R1 points to a location in normal memory. R2 and R3 point to device memory.

Which of the following statements best describes the ordering rules which apply to this sequence?

Options:

A.

The two writes to device memory will happen in program order, but the read can be performed out of order

B.

The memory accesses can happen in any order

C.

The memory accesses will happen in program order

D.

The read to r0 and the write from r0 will happen in program order, but the write from r3 can be performed out of order

Buy Now
Questions 56

To return from a Data Abort handler and re-execute the aborting instruction, what value should be loaded to the PC?

Options:

A.

PC=LR

B.

PC=LR44

C.

PC=LR-4

D.

PC=LR-8

Buy Now
Questions 57

When setting the initial location of the stack pointer and the base address of the heap, the ARM EABI requires that the:

Options:

A.

Base address of the heap must be the same as the initial stack pointer.

B.

Stack pointer must be 8-byte aligned.

C.

Heap must be in external RAM.

D.

Initial stack pointer must be the lowest addressable memory location.

Buy Now
Questions 58

When using the ARM Compiler (armcc), which of the following possible keywords can be used to remove padding bytes from a structure?

Options:

A.

__package

B.

__packed

C.

__compact

D.

__compress

Buy Now
Questions 59

What is the maximum value of the immediate field in an ARM SVC instruction?

Options:

A.

0x0

B.

0xF

C.

0xFF

D.

0xFFFFFF

Buy Now
Questions 60

Which of the following ARM processors has the best energy efficiency (measured in mW/MHz)?

Options:

A.

Cortex-M0+

B.

Cortex-M4

C.

Cortex-R4

D.

Cortex-A15

Buy Now
Questions 61

When the processor is executing in Thumb state, which of the following statements is correct about the values stored in R15?

Options:

A.

Bits[31:16] are duplicated with bits[15:0]

B.

The PC value is stored in bits[31:1] and bit[0] is treated as zero

C.

The PC value is stored in bits[31:16] and bits[15:0] are undefined

D.

The PC value is stored in bits[15:0] and bits[31:16] are undefined

Buy Now
Questions 62

What will be the contents of R2 after the execution of the following piece of code?

LDRR1, =0xAABBCCDD

MOV R2, #0x4

ANDSR1, R1, #0x4

ADDNE R2, R2, #0x4

Options:

A.

R2 = 0x4

B.

R2 = 0x8

C.

R2 = 0xAABBCCDD

D.

R2 = 0xAABBCCD4

Buy Now
Questions 63

Which THREE of the following items should be preserved by software when entering dormant mode? (Choose three)

Options:

A.

Current Program Status Register (CPSR)

B.

Contents of the Level 2 data cache

C.

The Floating Point Status and Control Register (FPSCR)

D.

All User mode general-purpose registers

E.

The CP15 Multiprocessor Affinity Register

F.

Contents of the Level 1 data cache

Buy Now
Exam Code: EN0-001
Exam Name: ARM Accredited Engineer
Last Update: Nov 20, 2024
Questions: 210
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now EN0-001