Walk into any supermarket or pharmacy and you will find several shelves of products designed to protect adults and children from the sun. Additionally, a host of public health campaigns have been created, including National Skin Cancer Awareness Month, that warn us about the sun's damaging UV rays and provide guidelines about protecting ourselves. While warnings about the sun's dangers are frequent, a recent survey found that fewer than half of all adults adequately protect themselves from the sun.
This paragraph best supports the statement that

Walk into any supermarket or pharmacy and you will find several shelves of products designed to protect adults and children from the sun. Additionally, a host of public health campaigns have been created, including National Skin Cancer Awareness Month, that warn us about the sun's damaging UV rays and provide guidelines about protecting ourselves. While warnings about the sun's dangers are frequent, a recent survey found that fewer than half of all adults adequately protect themselves from the sun.
This paragraph best supports the statement that Correct Answer adults are not heeding the warnings about the dangers of sun exposure seriously enough.

The last sentence gives direct support for this response. Although children might be better protected from the sun than adults, the paragraph does not specifically cite statistics about children, so we can't know for sure, ruling out choice a. There is no evidence provided in the paragraph to support choices b and d. Choice e is incorrect since the last sentence tells us that warnings about the sun's dangers are frequent.

Related Questions

Obesity is a serious problem in this country. Research suggests that obesity can lead to a number of health problems including diabetes, asthma, and heart disease. Recent research has even indicated that there may be a relationship between obesity and some types of cancer. Major public health campaigns that increase awareness and propose simple lifestyle changes that will, with diligence and desire, eliminate or least mitigate the incidence of obesity are a crucial first step in battling this critical problem.
This paragraph best supports the statement that
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.