Part 1
There is limited use of the root or super user account in Linux because the user of the account has administrator privileges. This account is cautiously guarded because the user can make unrestricted changes to the system. The user can also make changes anywhere in the system which could result in adverse implications. The Windows operating system has a built-in administrator account and an administrator user account making the account less cautiously guarded compared to the root account in Linux. The two accounts in Windows have equal privileges. However, the user of the administrator account can make system-wide changes but with limited privileges to the Local System. In the Windows operating system, the root user is the Local System built-in service account which runs all system processes.
Part 2
One of the Linux automated assessment tools is the kismet. The primary functions of the Kismet include a packet sniffer, a network detector and an intrusion detection system (Shiva et al. 2015). One of the strengths of Kismet includes its ability to work passively. It is also able to detect and associate wireless clients and wireless access points. One of the tools weakness is that it is not easy to use, it requires significant knowledge on wireless networking, wireless security, and hardware. Meaningful results can only be achieved when the Kismet is properly configured. Some of the competing products include the Wireshark, DSniff, and TcpDump. The tool works in different systems as long as the wireless card used supports raw monitoring mode. Hackers and security staff commonly use the tool. As a security manager, I would consider using the tool on my team. The tool would be useful for various functions in the system such as assessing the system and also for penetration testing.
Reference
Shiva, S., Siddartha, L., Chandavarka, B. & Thejdeep, G. (2015) Detecting Rogue Access Points Using Kismet. Communications and Signaling Processing (ICCSP), 2015 International Conference