You are analyzing a poorly-performing process model.
You find that the process model in question has a lot of nodes and is mainly used to do background updates.
Which two things can be done to increase its performance? (Choose two.)
While deploying a package to a target environment, object security warnings were detected.
In which two places can object security settings be changed in bulk? (Choose two.)
Application users are seeing long wait times between two forms they need to complete for a case.
While reviewing the process model, you identify that activity chaining has been used throughout the process model, including unattended nodes.
Which three actions can you take to make the process model more efficient? (Choose three.)