A and D
Foreign Exchange Station (FXS) ports connect to analog station endpoints (such as fax machines, modems, and telephones). Foreign Exchange Office (FXO) ports connect to the PSTN or act as PBX trunk connections. The third type of analog interface (E&M) is not listed in the question.
B and D
Cisco Catalyst switches have the ability to provide PoE (both 802.3af and the Cisco prestandard) and handle CoS tagging on incoming packets (both on the data and voice VLANs).
B and C
All Cisco IP Phones use Skinny signaling to communicate with the Cisco CallManager, but only the router-like device that uses Skinny is the VG200 series. This is because the VG200 series acts as a number of end devices with numerous FXS ports.
The correct wildcard to use on voice gateway devices is the "." which matches any dialed digit. When configuring route patterns on the Cisco CallManager, you use the "X" wildcard to accomplish this same thing.
The Call Classification feature gives you the ability to distinguish and monitor OnNet and OffNet calls through the gateway. Using this information, you can prevent toll-fraud techniques using conference calls and transfers.
When configuring an MGCP router, you can use the syntax mgcp call-agent ip_address to designate the primary Cisco CallManager. You can use the ccm-manager redundant-host syntax to designate the secondary and tertiary Cisco CallManager servers. The tertiary CallManager in this syntax is 10.1.1.6.
A and B
You can configure a switch running the NativeIOS using the same configuration as you would a standard voice gateway. Non-IOS MGCP is used if the 6500 Catalyst switch is running the CatOS operating system.
Trunk configurations are logical links to other networks. They have the ability to determine the location of an endpoint, but do not carry voice traffic. Gateways also act as logical links to other networks, but the CallManager also uses them to route voice traffic.
Gatekeepers ease configuration of Intercluster Trunk connections by providing a central point of trunking. Without a gatekeeper, every CallManager cluster must have an Intercluster Trunk connection to every other cluster in a full-mesh relationship. Unfortunately, gatekeepers also introduce a single point of failure in the network, which is why you should consider additional failover mechanisms for this device.
CallManager uses the H.225 Registration, Admission, and Status (RAS) protocol to communicate with the gatekeeper. You can think of this as a conversation protocol that allows the CallManager to determine the location of an endpoint and the authority to send the call.
Part I: Cisco CallManager Fundamentals
Introduction to Cisco Unified Communications and Cisco Unified CallManager
Cisco Unified CallManager Clustering and Deployment Options
Cisco Unified CallManager Installation and Upgrades
Part II: IPT Devices and Users
Cisco IP Phones and Other User Devices
Configuring Cisco Unified CallManager to Support IP Phones
Cisco IP Telephony Users
Cisco Bulk Administration Tool
Part III: IPT Network Integration and Route Plan
Cisco Catalyst Switches
Configuring Cisco Gateways and Trunks
Cisco Unified CallManager Route Plan Basics
Cisco Unified CallManager Advanced Route Plans
Configuring Hunt Groups and Call Coverage
Implementing Telephony Call Restrictions and Control
Implementing Multiple-Site Deployments
Part IV: VoIP Features
Configuring User Features, Part 1
Configuring User Features, Part 2
Configuring Cisco Unified CallManager Attendant Console
Configuring Cisco IP Manager Assistant
Part V: IPT Security
Securing the Windows Operating System
Securing Cisco Unified CallManager Administration
Preventing Toll Fraud
Hardening the IP Phone
Understanding Cryptographic Fundamentals
Understanding the Public Key Infrastructure
Understanding Cisco IP Telephony Authentication and Encryption Fundamentals
Configuring Cisco IP Telephony Authentication and Encryption
Part VI: IP Video
Introducing IP Video Telephony
Configuring Cisco VT Advantage
Part VII: IPT Management
Introducing Database Tools and Cisco Unified CallManager Serviceability
Configuring Alarms and Traces
Using Additional Management and Monitoring Tools
Part VIII: Appendix
Appendix A. Answers to Review Questions