Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?