Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

EN0-001 Questions and Answers

Question # 6

A 32KB 4-way set associative instruction cache supports a cache line size of 64 bytes. How many bits are required to index a cache line in a way?

A.

6 bits

B.

7 bits

C.

9 bits

D.

15 bits

Full Access
Question # 7

Which of the following ARM processors has the best energy efficiency (measured in mW/MHz)?

A.

Cortex-M0+

B.

Cortex-M4

C.

Cortex-R4

D.

Cortex-A15

Full Access
Question # 8

The following ARM instruction can be used to return from an exception:

movs pc, lr

Apart from the program counter, which register is updated by this instruction?

A.

Ir

B.

r0

C.

CPSR

D.

SCTLR

Full Access
Question # 9

An undefined instruction will cause an Undefined Instruction exception to be taken when:

A.

It is fetched.

B.

It is decoded.

C.

It is executed.

D.

It writes back its results.

Full Access
Question # 10

When linking with the standard C library, which library functions MUST be redefined in order to port your code to a new piece of production hardware?

A.

Functions that are not compliant with the ISO C library standard

B.

Functions that are not compliant with the 1985 IEEE 754 standard for binary floating-point arithmetic

C.

Target-dependent functions which use semihosting

D.

Functions called implicitly by the compiler

Full Access
Question # 11

Which instruction would be used to return from a Reset exception?

A.

MOVS PC, R14

B.

MOVSPC, R13

C.

Architecturally not defined

D.

SUBS PC, R14, #4

Full Access
Question # 12

A Just-In-Time compiler writes instructions to a region of memory that is configured using a writeback cache strategy. For the locations that have been written, what is the MINIMUM cache maintenance that MUST be performed before the new instructions can be reliably executed?

A.

Instruction cache clean only

B.

Instruction cache invalidate only

C.

Data cache clean and instruction cache invalidate

D.

Data cache invalidate and instruction cache invalidate

Full Access
Question # 13

Which TWO of the following mechanisms cause the ARM processor to take an abort? (Choose two)

A.

MPU fault

B.

External memory system error

C.

Bounced coprocessor instruction

D.

Unrecognized instruction opcode

E.

Illegal operands for a data-processing instruction

Full Access
Question # 14

Which one of the following statements best describes the function of vector catch logic?

A.

It traps writes to the memory containing the vector table

B.

It provides additional resources for debugging exception handlers

C.

It provides configurable exception priorities on an ARM processor

D.

It provides an improved mechanism for an application to handle exceptions

Full Access
Question # 15

When using the default ARM tool-chain libraries for bare-metal applications. I/O functionality is rerouted and handled by a connected debugger. This is often referred to as semihosting. Which one of the following explanations BEST describes how this feature can be implemented by a debugger?

A.

The library directly sends I/O requests to the debugger using the JTAG connection

B.

While the target is running, the debugger processes I/O requests from a shared queue in memory

C.

The I/O library calls rely on an Ethernet connection to redirect the requests to the debugger

D.

The I/O library calls generate an exception that is trapped and handled by the debugger

Full Access
Question # 16

According to the AAPCS, how many bytes are used to store a C variable of type 'int' in memory?

A.

1 byte

B.

2 bytes

C.

4 bytes

D.

8 bytes

Full Access
Question # 17

In Thumb state an ARMv7-A processor can execute:

A.

Only 16-bit Thumb instructions.

B.

Only 32-bit Thumb instructions.

C.

16-bit and 32-bit Thumb instructions.

D.

32-bit Thumb and certain ARM instructions.

Full Access
Question # 18

In a hardware system that runs software providing secure systems, which of the following describes the behavior of external memory and peripherals?

A.

They are not accessible when the processor is in Non-secure state

B.

They cannot know whether the processor is performing a Secure or Non-secure access

C.

They can use the Secure or Non-secure status of the access to decide what response to give

D.

They are required to give an ERROR response when Secure code accesses Non-secure locations in memory

Full Access
Question # 19

What is the value of R2 after execution of the following instruction sequence?

MOV R3, #0xBA

MOV R2/#0x10

BIC R2, R3, R2

A.

R2 = 0xBB

B.

R2 = 0xCB

C.

R2 = 0xAA

D.

R2 = 0xCC

Full Access
Question # 20

In a Cortex-A processor, assume an initial value of R1 =0x80004000.

If the following instruction causes a data abort, what value will R1 contain on entry to the abort handler?

LDR R0, [R1, #8]!

A.

0x80003FF8

B.

0x80004000

C.

0x80004008

D.

R1 contents are unpredictable

Full Access
Question # 21

Which of the following is an external exception?

A.

Supervisor Call

B.

FIQ

C.

Undefined Instruction

D.

Parity

Full Access
Question # 22

When debugging an embedded Linux system, which one of the following techniques can be used to halt a single user thread, while allowing other threads to continue to run during the debug process?

A.

Halting a single user thread in an embedded Linux system is not possible

B.

Use the Linux kernel printk() function to output messages to the console

C.

Connect a Linux-aware JTAG debugger to the target, which allows single-stepping of the code

D.

Connect a debugger running on an external host device to an instance of gdbserver running on the target, using Ethernet

Full Access
Question # 23

Which of the following instructions can be used to enter a power saving mode?

A.

PLD

B.

PLI

C.

WFE

D.

DSB

Full Access
Question # 24

Which of the following features was added in version 2 of the ARM Architecture Advanced SIMD extensions?

A.

Additional quadword registers

B.

Support for double precision floating-point arithmetic

C.

Fused Multiply-Accumulate (Fused MAC) instructions

D.

Support for polynomials

Full Access
Question # 25

When should an ISB instruction be used?

A.

When executing a long branch

B.

When clearing the branch predictor caches

C.

When reading a register from a coprocessor

D.

When returning from an exception handler

Full Access
Question # 26

If the processor is in User mode and then an IRQ interrupt occurs:

A.

CPSR mode bits are set to User mode and SPSR _User mode bits are set to IRQ.

B.

CPSR mode bits are set to IRQ and SPSR_Irq mode bits are set to User.

C.

CPSR mode bits are set to IRQ and SPSR_Irq mode bits are set to IRQ.

D.

CPSR mode bits are set to User and SPSR User mode bits are set to IRQ.

Full Access
Question # 27

A simple system comprises of the following memory map:

Flash - 0x0 to 0x7FFF

RAM - 0x10000 to 0X17FFF

When conforming to the ABI, which of the following is a suitable initial value for the stack pointer?

A.

Top address of RAM (0x18000)

B.

Top address of flash (0x8000)

C.

Bottom address of RAM (0x10000)

D.

Bottom address of flash (0x0000)

Full Access
Question # 28

For Cortex-A series cores, what instruction(s) are recommended to implement a mutex or semaphore?

A.

SWP and SWPB

B.

DSB and ISB

C.

LDREX and STREX

D.

DMB

Full Access
Question # 29

Clicking the Start button in a debugger:

A.

Begins processor execution.

B.

Resets the processors.

C.

Erases existing breakpoints.

D.

Puts the processor(s) into debug state.

Full Access
Question # 30

When using the ARM Compiler (armcc), which of the following possible keywords can be used to remove padding bytes from a structure?

A.

__package

B.

__packed

C.

__compact

D.

__compress

Full Access
Question # 31

When an ARMv7-A MPCore system is in SMP mode, which of the following TWO operations can the processor handle automatically? (Choose two)

A.

Coherency management between all L1 data caches

B.

Broadcast of some inner-shared cache and TLB maintenance operations

C.

Broadcast of some outer-shared cache and TLB maintenance operations

D.

Coherency management between all L1 instruction caches

E.

Coherency management between all external caches

Full Access