This document provides answers to questions related to symmetric block cipher, encryption process, different encryption types, advantages and disadvantages of Cipher-Block Chaining (CBC) mode, ethical considerations of unbreakable encryptions, authentication mechanisms, importance of strong passwords, basics of cybersecurity, vulnerability scoring, and firewall rules.