1) Having spoken to Simon Bennetts, it looks like the API will not alow the polling of the state of active scans during attack mode (the one similar to burps live active scans) the reason to remove the scope at the end is to return zap to its initial state for the next test to come along.
2) Thats not exactly what I meant, the intention is to check if the scanner would pick up known real world examples of web app security bugs, learn from them and tune the scanner in order to be able to do so. I did mean to have a scan rule for every CVE, but to ensure that the scan rules are sharp enough and to check that they would have retrospectively picked up these issues. IF not then why and learn from them to improve the scan rules.
3) I don't think the number is as important as picking up the parameters that change. So for a given page, once they are identified you can stop making the same requests. As you have said some might take 3, others 10, but we would be in a much better place than where we are now.