You must have SQL Server Express, SQL Server Management Studio, and the Adventure Works® OLTP database installed to perform this Assessment. You will also want to download, or bookmark, the design document for that database. If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: SQL Server Setup. Complete the following: For each of the following actions, use the Adventure Works database to formulate an SQL solution. Please copy the numbered action into your Microsoft Word® document. For items 1–5 below, provide screenshot of the execution of the SQL showing the code and the result set. Make sure to also respond to items 6 and 7. Start a next action on a new page. Show a person’s name, credit card number, and type. Show a store name and year-to-date sales. Group by name and year-to-date values. Create three tables with the following parameters: IN301: primary key field, vulnerability_id, solution_id and organization. All fields require a value except the organization. Identify foreign key columns properly. Vulnerability: primary key field, vulnerability_name. All fields require values. Solution, primary key field, solution_name. All fields require values. Insert 5 rows into each table. Ensure two IN301 organization fields have null values. Show an organization, vulnerability and solution. Be sure to only show the organization with values. Using the Adventure Works design document, identify important data assets. Explain your table selections. Keeping those important data assets in mind, develop a DREAD threat rating for the below. Include a brief description of which had the higher risk rating and explain why. Excessive privilege abuse. Malware. In order to obtain mastery level for this Competency Assessment, complete the following: Apply the Microsoft Threat Modeling Tool™ to model a case of a mobile client sending a request to a database. Show the database returning a response to the mobile client. Create a full report of the results. Part 2: Big Data Ecosystem You must have VirtualBox® and Hortonworks Hadoop HDP installed and running. If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: Hadoop Setup. Complete the following: For each of the actions, as applicable, use the Hortonworks Hadoop HDP virtual machine environment. Please copy the numbered action into your Microsoft Word document. Respond to items 1–3. For items 4–5 below, provide a screenshot of the execution showing the command and the result set. Start a next action on a new page. Other than authentication, explore a big data security concern in depth. Explain what it is, why it is a security concern and possible solutions. Other than Kerberos, research what Hadoop uses to ensure secure authentication, permissions, and/or data accessibility. Explain how Kerberos works in the Hadoop ecosystem. Secure shell to the Hadoop virtual machine. Transfer a file to and from your host and Hadoop virtual machine.