Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

EN0-001 ARM Accredited Engineer Questions and Answers

Questions 4

According to the AAPCS, how many bytes are used to store a C variable of type ' int ' in memory?

Options:

A.

1 byte

B.

2 bytes

C.

4 bytes

D.

8 bytes

Buy Now
Questions 5

Which of the following statements is TRUE with respect to the power consumption related to memory accesses?

Options:

A.

Accessing a large memory device consumes less power than accessing a small one

B.

A series of non-sequential accesses is more efficient than a series of sequential accesses

C.

Increasing the size of the cache will always reduce power consumption for a given application

D.

Storing frequently used data in Tightly Coupled Memory will reduce power consumption

Buy Now
Questions 6

A Just-In-Time compiler writes instructions to a region of memory that is configured using a writeback cache strategy. For the locations that have been written, what is the MINIMUM cache maintenance that MUST be performed before the new instructions can be reliably executed?

Options:

A.

Instruction cache clean only

B.

Instruction cache invalidate only

C.

Data cache clean and instruction cache invalidate

D.

Data cache invalidate and instruction cache invalidate

Buy Now
Questions 7

In an ARMv7-A processor with Security Extensions, which of the following mechanisms best describes the way Secure memory is protected from access by software running in a Non-secure privileged mode?

Options:

A.

The memory system has visibility of the security status of all accesses, and will reject all Non-secure accesses to Secure memory

B.

Secure memory contents are encrypted, and cannot be decrypted by Non-secure software

C.

The level 2 cache controller blocks all accesses to Secure memory when the SCR.NS bit of the processor is set

D.

The MMU generates an abort on accesses to Secure memory performed by Non-secure software

Buy Now
Questions 8

Which of the following is an advantage of the single-step debug technique?

Options:

A.

It allows a complete trace of real-time program execution to be captured

B.

It reduces the number of pins required to connect the debugger to the processor

C.

It allows examination of the system state before and after execution of a statement

D.

It requires only one change to the program source code

Buy Now
Questions 9

What view in a debugger displays the order in which functions were called?

Options:

A.

The Call Stack view

B.

The Memory view

C.

The Registers view

D.

The Variables view

Buy Now
Questions 10

The following pseudocode sequence shows a flag being set to indicate that new data is ready to be read by another thread:

data = 123;

ready = true;

Assuming that the reader threads may execute on any other core of a multicore system, which of the following is the most efficient memory barrier to place between the two writes to prevent them being observed in the opposite order?

Options:

A.

DSBSY

B.

DSBST

C.

DMBSY

D.

DMBST

Buy Now
Questions 11

In general, when programming in C, stack accesses will be reduced by:

Options:

A.

Disabling inlining.

B.

Never passing more than four parameters in function calls.

C.

Declaring automatic variables as " packed " .

D.

Configuring the compiler to optimize for space.

Buy Now
Questions 12

Consider the following instruction sequence:

STR r0, [r2] ; instruction A

DSB

ADD r0, r1, r2 ; instruction B

LDR r3, [r4] ; instruction C

SUB r5, r6, #3 ; instruction D

At what point will execution pause until the STR access is complete?

Options:

A.

After instruction A and before the DSB

B.

After the DSB and before instruction B

C.

After instruction B and before instruction C

D.

After instruction C and before instruction D

Buy Now
Questions 13

If the performance of an application remains unchanged when the core clock speed of a Cortex-A9 processor is reduced, what can you deduce about the system?

Options:

A.

The Clocks Per Instruction (CPI) of the processor has increased

B.

The processor is NOT the limiting factor on performance

C.

Instruction cache utilization has improved

D.

The core has stopped carrying out speculative data memory accesses

Buy Now
Questions 14

In Thumb state an ARMv7-A processor can execute:

Options:

A.

Only 16-bit Thumb instructions.

B.

Only 32-bit Thumb instructions.

C.

16-bit and 32-bit Thumb instructions.

D.

32-bit Thumb and certain ARM instructions.

Buy Now
Questions 15

Cross compiling enables a programmer to:

Options:

A.

Produce a binary object that will run on processors based on any architecture.

B.

Mix different source languages within the same source file and compile with a single tool.

C.

Run code written for one processor on a processor based on a different architecture.

D.

Compile target code using a computer based on a different architecture.

Buy Now
Questions 16

Consider a sequence of five independent instructions running on a pipelined processor. There are no interlocks and no data dependencies between instructions, and each instruction takes one cycle to execute. The processor has three pipeline stages and is not superscalar.

How many cycles does it take to fetch, decode and execute all five instructions in sequence, assuming that there are no pipeline stalls?

Options:

A.

5 cycles

B.

7 cycles

C.

8 cycles

D.

15 cycles

Buy Now
Questions 17

When linking with the standard C library, which library functions MUST be redefined in order to port your code to a new piece of production hardware?

Options:

A.

Functions that are not compliant with the ISO C library standard

B.

Functions that are not compliant with the 1985 IEEE 754 standard for binary floating-point arithmetic

C.

Target-dependent functions which use semihosting

D.

Functions called implicitly by the compiler

Buy Now
Questions 18

In a system using the Security Extensions, how does the Secure Monitor execute a switch from Secure to Non-secure state?

Options:

A.

Encrypts Secure register contents, sets the NS bit in SCTLR and branches directly to Normal world code

B.

Saves Secure register contents, sets all registers to zero, sets the NS bit in SCTLR and branches directly to Normal world code

C.

Saves Secure register contents, loads Non-secure ones from memory, sets the NS bit in SCTLR and performs an exception return

D.

Sets the NS bit in SCTLR and performs an exception return - all registers are banked in hardware and switched automatically

Buy Now
Questions 19

In the Generic Interrupt Controller (GIC), when an interrupt is requested, but is not yet being handled, it is in which of the following states?

Options:

A.

Inactive

B.

Active

C.

Pending

D.

Edge-triggered

Buy Now
Questions 20

Capturing processor execution trace is characterized as being:

Options:

A.

Influenced by breakpoints.

B.

Intrusive on normal processor operation.

C.

Inaccurate regarding code execution history.

D.

Not intrusive on normal processor operation.

Buy Now
Questions 21

Using a lower optimization level when compiling will:

Options:

A.

Produce faster code.

B.

Produce smaller code.

C.

Produce non standard-compliant code.

D.

Produce code that might be easier to debug.

Buy Now
Questions 22

Assuming a 4-core Cortex-A9 SMP system which does not use the Accelerator Coherency Port (ACP). and operates the L1 caches in writeback mode, in which of the following situations is a cache clean operation required?

Options:

A.

An external DMA engine modifies data in a region of data memory which is already cached by the processor

B.

An external agent needs to read data which has been modified by the processor in a cacheable memory region

C.

Debugger reads data from a shared, cacheable memory location

D.

One core modifies data in a shared cacheable memory region

Buy Now
Questions 23

In a single-processor system, which of these operations requires a barrier instruction to guarantee correct operation?

Options:

A.

Copying data from Flash to RAM

B.

Changing from one privileged mode to another

C.

Loading code into memory and then executing it

D.

Incrementing a RAM location that will be read by an interrupt handler

Buy Now
Questions 24

Which of these instructions is a correct translation of the body of function f?

struct T { char a; int b; };

int f(struct T *p) { return p- > b; }

Options:

A.

LDR r0, [r0], #1

B.

LDR r0, [r0]. #4

C.

LDR r0, [r0.#1]

D.

LDR r0, [r0. #4]

Buy Now
Questions 25

Which of the following statements best describes a Board Support Package (BSP)?

Options:

A.

PC interface hardware for configuring a boot monitor

B.

Hardware specific source code needed for operating system support

C.

A working port of Linux for a specific hardware platform

D.

Debugging hardware and software supplied with a development board

Buy Now
Questions 26

Which one of these statements is TRUE about code running on final hardware without a debugger attached?

Options:

A.

It must start executing from RAM

B.

RAM must be initialized before reset

C.

Exception handlers must execute from ROM or flash memory

D.

It must not execute semihosting SVC or BKPT instructions

Buy Now
Questions 27

In which type of storage will the compiler preferentially place frequently accessed variables?

Options:

A.

Stack

B.

Heap

C.

Registers

D.

Hard disk

Buy Now
Questions 28

A deeply embedded real-time industrial control system is missing some hard real-time interrupt deadlines. Which of the following performance analysis techniques is the most suitable for identifying which routines are causing the problem?

Options:

A.

Use an ETM instruction trace profiler, which outputs information about the program as it runs

B.

Add some serial logging to the software, which outputs information about the program as it runs

C.

Add a new interrupt handler, which is triggered off a timer, and dump information about the interrupted process

D.

Use a JTAG sample-based profiler, which periodically halts the CPU, and dumps information about the interrupted process

Buy Now
Questions 29

The disassembly of a program written in C shows calls to the function__aeabi_fadd. Which one of these compiler floating point options could have been used?

Options:

A.

Hard floating-point linkage

B.

Soft floating-point linkage without floating-point hardware

C.

Hard floating-point linkage with optimization for space

D.

Soft floating-point linkage with floating-point hardware

Buy Now
Questions 30

Which THREE of the following items should be preserved by software when entering dormant mode? (Choose three)

Options:

A.

Current Program Status Register (CPSR)

B.

Contents of the Level 2 data cache

C.

The Floating Point Status and Control Register (FPSCR)

D.

All User mode general-purpose registers

E.

The CP15 Multiprocessor Affinity Register

F.

Contents of the Level 1 data cache

Buy Now
Questions 31

When developing a product using the standard ARM C library, what is the minimum effort required to re-target all platform-specific functions in the library?

Options:

A.

Replace all functions which use semi-hosting

B.

Locate the stack in an area of RAM

C.

Set the locale variable appropriately

D.

All functions in the standard library must be rewritten

Buy Now
Questions 32

A function written in C has the prototype:

void my_function(float a. double b, float c);

The function is built and linked into an application using hard floating-point linkage. What registers are used to pass arguments to the function?

Options:

A.

a- > s0; b- > d0; c- > s1

B.

a- > s0; b- > d1; c- > s1

C.

a- > d0; b- > d1; c- > d2

D.

a- > s0; b- > d1; c- > s2

Buy Now
Questions 33

Assume a Big-Endian (BE) memory system with the following memory contents.

Byte Address Contents

0x100 0x11

0x101 0x22

0x102 0x33

0x103 0x44

If R5 = 0x100, what are the contents of R4 after performing the following operation?

LDR R4, [R5]

Options:

A.

0x11223344

B.

0x44332211

C.

0x22114433

D.

0x33441122

Buy Now
Questions 34

A program running on a development board that is connected to a host using a debugger can access a file on the host by using:

Options:

A.

Memory mapping

B.

Semihosting

C.

Polling

D.

Virtual I/O

Buy Now
Questions 35

On a processor supporting the Security Extensions, what sequence of operations is required to move from Non-secure User mode to Secure state?

Options:

A.

This transition is not possible

B.

Execution of an SMC instruction

C.

Execution of an SMC instruction followed by an SVC instruction

D.

Execution of an SVC instruction followed by an SMC instruction

Buy Now
Questions 36

What side-effect could using a debugger to read memory contents have?

Options:

A.

The memory contents could be set to zero

B.

Some memory contents could be rewritten

C.

The processor MMU pagetables could be modified

D.

The processor cache could be cleaned or/and invalidated

Buy Now
Questions 37

According to the AAPCS, which of the following statements is TRUE with regard to preservation of register values by a function?

Options:

A.

A function must preserve R0-R3 and R12

B.

A function must preserve R4-R11 andR13

C.

No registers may be corrupted by any function

D.

All registers may be corrupted by any function

Buy Now
Questions 38

In a Cortex-A processor, assume an initial value of R1 =0x80004000.

If the following instruction causes a data abort, what value will R1 contain on entry to the abort handler?

LDR R0, [R1, #8]!

Options:

A.

0x80003FF8

B.

0x80004000

C.

0x80004008

D.

R1 contents are unpredictable

Buy Now
Questions 39

According to the EABI. what would the C size of () operator return when given the following structure?

EN0-001 Question 39

Options:

A.

19

B.

20

C.

24

D.

28

Buy Now
Questions 40

Which of the following would enable the use of a symmetric multiprocessing (SMP) operating system?

Options:

A.

A dual-core Cortex-A9 processor

B.

A Cortex-R4 processor with a Cortex-M3 system controller

C.

A Cortex-A8 processor with a graphics processing unit (GPU)

D.

A uni-core Cortex-A5 processor with a digital signal processor (DSP)

Buy Now
Questions 41

The effect of clicking the Stop button in a debugger is to:

Options:

A.

Put the processor(s) into debug state.

B.

Force the processor to execute a BKPT instruction

C.

Hold the processor in a Reset condition

D.

Re-initialize the memory contents.

Buy Now
Questions 42

An advantage of removable flash memory over built-in flash memory is that:

Options:

A.

Storage can be easily replaced, for example to increase capacity.

B.

It is quicker to access, providing far greater bandwidth for read operations.

C.

It has a longer life, indicated by being rated for a higher number of write cycles.

D.

It takes up less physical space in a device, and does not require any space on the printed circuit board.

Buy Now
Questions 43

In Architecture ARMv7-A which one of the following has a known physical address at power-on reset?

Options:

A.

The exception vector table

B.

The Memory Management Unit (MMU) translation table

C.

The Stack Pointer (SP)

D.

The System Control Register (SCTLR)

Buy Now
Questions 44

Which one of the following statements best describes the function of vector catch logic?

Options:

A.

It traps writes to the memory containing the vector table

B.

It provides additional resources for debugging exception handlers

C.

It provides configurable exception priorities on an ARM processor

D.

It provides an improved mechanism for an application to handle exceptions

Buy Now
Questions 45

In an ARMv7-A processor that includes the Advanced SIMD extension (NEON), where are the data values operated on by NEON instructions stored?

Options:

A.

In system memory

B.

In registers shared with the VFP register set

C.

In registers shared with the integer register set

D.

In dedicated registers not shared with other registers

Buy Now
Questions 46

The size of a C ' int ' type in the ARM architecture is:

Options:

A.

8 bits

B.

16 bits

C.

32 bits

D.

64 bits

Buy Now
Questions 47

A C code segment contains three calls to a function, foobar ().

This code segment is to be linked with a static library that defines foobar ().

Ignoring inlining, how many copies of foobar () will the ARM linker place in the output?

Options:

A.

None

B.

Always one

C.

Always three

D.

One or more depending on optimization level

Buy Now
Questions 48

An ARM processor connected to a Generic Interrupt Controller (GIC) is handling an active interrupt 11. A new interrupt 12 that is received at the GIC is forwarded to the processor, and the active interrupt 11 is preempted. Which of the following possible values of 11 ' s priority (P1), 12 ' s priority (P2) and the processor’s priority mask (PM) permit this to happen? Assume there are 256 priority levels implemented.

Options:

A.

P1 = 0x0F, P2 = 0x10, PM = 0xFF

B.

P1 = 0x10, P2 = 0x0F, PM = 0xFF

C.

P1 =0x0F, P2 = 0x10. PM = 0x0

D.

P1 = 0x10, P2 = 0x0F, PM = 0x0

Buy Now
Questions 49

When using a Generic Interrupt Controller (GIC), how does code cause a software-generated interrupt?

Options:

A.

By executing an SGI instruction

B.

By writing to a register in the GIC

C.

By writing to the F bit in the CPSR

D.

By writing to the I bit in the CPSR

Buy Now
Questions 50

Which of the following pairs of statements about the difference between a Memory Management Unit (MMU) and a Memory Protection Unit (MPU) is correct?

Options:

A.

The MMU uses translation tables. The MPU does not use translation tables.

B.

The MMU uses only physical addresses. The MPU translates virtual addresses to physical addresses.

C.

The MMU defines cacheability attributes for memory. The MPU does not define cacheability attributes for memory.

D.

The MMU defines access permissions for memory. The MPU does not define access permissions for regions of memory.

Buy Now
Questions 51

Which of the following operations would count as intrusive to normal processor operation?

Options:

A.

Tracing using Embedded Trace Macrocell (ETM)

B.

Halt mode debugging

C.

Monitor mode debugging

D.

Using the Performance Monitor Unit

Buy Now
Questions 52

Which privileged mode can kernel code use to get direct access to the User mode registers R13 and R14?

Options:

A.

Abort mode

B.

System mode

C.

Hypeivisor mode

D.

Supervisor mode

Buy Now
Questions 53

When using the default ARM tool-chain libraries for bare-metal applications. I/O functionality is rerouted and handled by a connected debugger. This is often referred to as semihosting. Which one of the following explanations BEST describes how this feature can be implemented by a debugger?

Options:

A.

The library directly sends I/O requests to the debugger using the JTAG connection

B.

While the target is running, the debugger processes I/O requests from a shared queue in memory

C.

The I/O library calls rely on an Ethernet connection to redirect the requests to the debugger

D.

The I/O library calls generate an exception that is trapped and handled by the debugger

Buy Now
Questions 54

What is the value of r0 after executing the following instruction sequence?

MOV r0, #200

MOV r5, #1

STR r3, [r0, r5, LSL#3]!

Options:

A.

200

B.

201

C.

204

D.

208

Buy Now
Questions 55

Which of the following is preserved in dormant mode?

Options:

A.

Core register contents

B.

CP15 (system) register settings

C.

Debug state

D.

Cache contents

Buy Now
Questions 56

Literal pool loads to access constants at run-time can be minimized by:

Options:

A.

Ensuring constants can be encoded as immediates in the current instruction set.

B.

Storing the code in ROM.

C.

Using Thumb code rather than ARM code.

D.

Compiling and linking as position-independent code.

Buy Now
Questions 57

Which of the following processor resources do NOT have to be saved or modified by the Linux scheduler during context switch?

Options:

A.

Registers R0-R15

B.

Thread and process ID registers

C.

The CPSR

D.

NEON and VFP registers

Buy Now
Questions 58

Which one of the following features must any processor support to conform to the ARMv7-A architecture?

Options:

A.

NEON (Advanced SIMD)

B.

Thumb-2 technology

C.

TrustZone (Security Extensions)

D.

Generic Interrupt Controller

Buy Now
Questions 59

Printf statements could be used to achieve which of the following debug tasks?

Options:

A.

Observe changes to a local variable in a function

B.

Capture a real-time trace of program execution

C.

Debug boot code, before a call to the C main() function

D.

Stop the processor at an interesting location in the code

Buy Now
Questions 60

When using the ARM Compiler (armcc), which of the following possible keywords can be used to remove padding bytes from a structure?

Options:

A.

__package

B.

__packed

C.

__compact

D.

__compress

Buy Now
Questions 61

The purpose of a translation lookaside buffer (TLB) is to:

Options:

A.

Protect memory.

B.

Improve performance.

C.

Implement virtual memory,

D.

Ensure correct ordering of memory operations.

Buy Now
Questions 62

When using the Performance Monitoring Unit to count runtime events the counter registers are limited to 32-bits. How can more than 2A32 events be counted without significantly impacting the software performance?

Options:

A.

Register an interrupt which is triggered when the counter overflows

B.

Count the events using a 64-bit VFP register

C.

Allow one event type to use concatenated counter registers

D.

Poll the event counter, resetting it when the counter is close to overflowing

Buy Now
Questions 63

Before execution:

R0=0xFFFFFFFF

R1 = ?

EOR R0, R0, R1

If R0=0x00000000 after executing the EOR instruction above, what was the value in R1 before the instruction executed?

Options:

A.

0x00000000

B.

0xFFFFFFFF

C.

0x11111111

D.

0xAAAAAAAA

Buy Now
Exam Code: EN0-001
Exam Name: ARM Accredited Engineer
Last Update: Apr 30, 2026
Questions: 210

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now EN0-001 testing engine

PDF (Q&A)

$43.57  $124.49
buy now EN0-001 pdf