Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

EN0-001 ARM Accredited Engineer Questions and Answers

Questions 4

Which of the following is TRUE for dynamically linked executables?

Options:

A.

They can contain unresolved relocations

B.

They contain the code and data for all libraries they use

C.

They are larger than an equivalent statically linked application

D.

They are designed to be run standalone with no other supporting software

Buy Now
Questions 5

Assume a multicore processor with coherency management based on the MESI protocol. When a core changes the contents of a shared cache line, what is the final status of that line in the local cache?

Options:

A.

Modified

B.

Exclusive

C.

Shared

D.

Invalid

Buy Now
Questions 6

In the Generic Interrupt Controller (GIC), when an interrupt is requested, but is not yet being handled, it is in which of the following states?

Options:

A.

Inactive

B.

Active

C.

Pending

D.

Edge-triggered

Buy Now
Questions 7

An Advanced SIMD intrinsic has the prototype:

uint8xl6x2_t vld2q_u8 (uint8_t const * ptr);

How many bytes does this intrinsic load from memory?

Options:

A.

2

B.

16

C.

32

D.

256

Buy Now
Questions 8

Consider the following instruction sequence:

STR r0, [r2] ; instruction A

DSB

ADD r0, r1, r2 ; instruction B

LDR r3, [r4] ; instruction C

SUB r5, r6, #3 ; instruction D

At what point will execution pause until the STR access is complete?

Options:

A.

After instruction A and before the DSB

B.

After the DSB and before instruction B

C.

After instruction B and before instruction C

D.

After instruction C and before instruction D

Buy Now
Questions 9

The following pair of functions implement a simple mutex spinlock which might be used to protect a critical code section in a multi-threaded application. The address of the lock variable is in r0.

In order to minimize power while waiting for the lock to be available. SEV and WFE instructions can be used to place the processor in a low power state while waiting for the lock to become available. At which points should these instructions be placed?

Questions 10

A Just-In-Time compiler writes instructions to a region of memory that is configured using a writeback cache strategy. For the locations that have been written, what is the MINIMUM cache maintenance that MUST be performed before the new instructions can be reliably executed?

Options:

A.

Instruction cache clean only

B.

Instruction cache invalidate only

C.

Data cache clean and instruction cache invalidate

D.

Data cache invalidate and instruction cache invalidate

Buy Now
Questions 11

When developing a product using the standard ARM C library, what is the minimum effort required to re-target all platform-specific functions in the library?

Options:

A.

Replace all functions which use semi-hosting

B.

Locate the stack in an area of RAM

C.

Set the locale variable appropriately

D.

All functions in the standard library must be rewritten

Buy Now
Questions 12

In a Cortex-A9 processor, when the Memory Management Unit (MMU) is disabled, which of the following statements is TRUE? (VA is the virtual address and PA is the physical address)

Options:

A.

VA == PA; No address translations; instructions and data are not cached

B.

VA! = PA; No address translations; instructions may be cached but not data

C.

VA == PA; Address translations take place; data may be cached but not instructions

D.

VA == PA; No address translations; instructions may be cached but not data

Buy Now
Questions 13

According to the AAPCS, how many bytes are used to store a C variable of type 'int' in memory?

Options:

A.

1 byte

B.

2 bytes

C.

4 bytes

D.

8 bytes

Buy Now
Questions 14

A C code segment contains three calls to a function, foobar ().

This code segment is to be linked with a static library that defines foobar ().

Ignoring inlining, how many copies of foobar () will the ARM linker place in the output?

Options:

A.

None

B.

Always one

C.

Always three

D.

One or more depending on optimization level

Buy Now
Questions 15

In general, when programming in C, stack accesses will be reduced by:

Options:

A.

Disabling inlining.

B.

Never passing more than four parameters in function calls.

C.

Declaring automatic variables as "packed".

D.

Configuring the compiler to optimize for space.

Buy Now
Questions 16

According to the AAPCS, which of the following statements is TRUE with regard to preservation of register values by a function?

Options:

A.

A function must preserve R0-R3 and R12

B.

A function must preserve R4-R11 andR13

C.

No registers may be corrupted by any function

D.

All registers may be corrupted by any function

Buy Now
Questions 17

What side-effect could using a debugger to read memory contents have?

Options:

A.

The memory contents could be set to zero

B.

Some memory contents could be rewritten

C.

The processor MMU pagetables could be modified

D.

The processor cache could be cleaned or/and invalidated

Buy Now
Questions 18

Literal pool loads to access constants at run-time can be minimized by:

Options:

A.

Ensuring constants can be encoded as immediates in the current instruction set.

B.

Storing the code in ROM.

C.

Using Thumb code rather than ARM code.

D.

Compiling and linking as position-independent code.

Buy Now
Questions 19

On an ARM processor that does not implement Security Extensions, which one of the following can be the starting address of the exception vector table?

Options:

A.

0xFFFFFFFF

B.

0xFFFFFFF0

C.

0xFFFF0000

D.

0x0000FFFF

Buy Now
Questions 20

In an ARMv7-A processor, with which level of the memory system is the Memory Management Unit (MMU) associated?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Buy Now
Questions 21

In the Generic Interrupt Controller (GIC) architecture, which of the following ID numbers are reserved for interrupts that are private to a CPU interface?

Options:

A.

ID0-ID7

B.

ID0-ID15

C.

ID0-ID31

D.

ID0-ID63

Buy Now
Questions 22

A message passing system between two CPUs is implemented using data stored in a shared area of memory. To pass a message, the first CPU executes the instructions:

The second CPU receives the message using the instructions:

On both CPUs, r1 = 0x5000 and r2 = 0x6000. At which of the points A, B, C and D must Data Memory Barrier (DMB) instructions be placed in order to ensure messages are passed reliably and efficiently?

Options:

A.

A only

B.

C only

C.

B and C

D.

A and D

Buy Now
Questions 23

As part of the ABI specification, the AAPCS defines which of the following?

Options:

A.

How many levels of nested function calls are permitted on ARM systems

B.

How to measure the maximum amount of stack required by an application

C.

On which mode's stack you need to save the return address in a non-leaf function

D.

Which registers need to be preserved by a function

Buy Now
Questions 24

Cross compiling enables a programmer to:

Options:

A.

Produce a binary object that will run on processors based on any architecture.

B.

Mix different source languages within the same source file and compile with a single tool.

C.

Run code written for one processor on a processor based on a different architecture.

D.

Compile target code using a computer based on a different architecture.

Buy Now
Questions 25

When using an Operating System, which of the following operations can NOT typically be done by user processes?

Options:

A.

Reading the link register (R14)

B.

Reading data from the user stack

C.

Changing from ARM state to Thumb state

D.

Changing the interrupt mask bits (A, I, F) in the CPSR

Buy Now
Questions 26

Printf statements could be used to achieve which of the following debug tasks?

Options:

A.

Observe changes to a local variable in a function

B.

Capture a real-time trace of program execution

C.

Debug boot code, before a call to the C main() function

D.

Stop the processor at an interesting location in the code

Buy Now
Questions 27

A simple method of measuring the performance of an application is to record the execution time using the clock on the wall or a wristwatch.

When is this method INAPPROPRIATE?

Options:

A.

When executing the software using a simulation model

B.

When the processor is a Cortex-R4

C.

When instruction tracing is enabled

D.

When the processor is not executing instructions from cache

Buy Now
Questions 28

How many bytes of stack are needed to pass parameters when calling the following function?

int foo( short arg_a, long long arg_b, char arg_c, int arg_d )

Options:

A.

0

B.

4

C.

8

D.

15

Buy Now
Questions 29

For Cortex-A series cores, what instruction(s) are recommended to implement a mutex or semaphore?

Options:

A.

SWP and SWPB

B.

DSB and ISB

C.

LDREX and STREX

D.

DMB

Buy Now
Questions 30

Why does Device memory prohibit speculative accesses?

Options:

A.

Speculative accesses might waste energy

B.

Speculative accesses might reduce performance

C.

Speculative accesses might cause unwanted cache coherency traffic

D.

Speculative accesses might cause undesired system state changes

Buy Now
Questions 31

Which of these C99 keywords can be used to indicate that two arrays do not overlap?

Options:

A.

"pure"

B.

"volatile"

C.

"static"

D.

"restrict"

Buy Now
Exam Code: EN0-001
Exam Name: ARM Accredited Engineer
Last Update: Apr 27, 2024
Questions: 210
EN0-001 pdf

EN0-001 PDF

$28  $80
EN0-001 Engine

EN0-001 Testing Engine

$33.25  $95
EN0-001 PDF + Engine

EN0-001 PDF + Testing Engine

$45.5  $130