What is a key sign of a phishing attack that exploits confirmation bias?

(Select The Best Answer)