The SQL Server Express 2008 setup allow you to assign different user account for each service.
For a development environment, would you use a domain user, local user, N
MS now has a good article on this: http://msdn.microsoft.com/en-us/library/ms143504(v=sql.105).aspx
They state that Local Service is not allowed for SQL Server Engine. Personally, I use Local System just to avoid issues during development, but in production, best practice is to create a domain level service account with just the permissions it needs to get the job done.
Whatever it wants to use as default. Changing that is just asking for trouble later.
It depends.
Local System is not recommended, it is an administrator equivalent account and thus can lead to questionable coding that takes advantage of administrator privileges which would not be allowed in a production system since security conscious Admins/DBA's really don't like to run services as admin.
Depending on if the server instance will need to access other domain resources or not should determine which type of low privilege account it should run under.
If it does not need to access any (non-anonymous) domain resources than I normally create a unique local, low privilege account for it to run under in order to gain the additional security benefit of not having multiple services running in the same identity context. Be aware that the Local Service account is not supported for the SQL Server or SQL Server Agent services.
If it does need to access non-anonymous domain resources then you have three options:
Most of what I tend to do does not require the service to access domain resources so I tend to use unique local low privilege accounts that I manage. I also run exclusively as a non-admin user (and have done so under XP SP2, Server 2003, Vista and Server 2008 with no major problems) so when I have cases where I need the service to access domain resources then I have no worries about using my own domain credentials (plus that way I don't have to worry the network admins about creating/maintaining a bunch of non-production domain identities).