To prevent DNS information from being altered during transmission, the option t of the protocol that you use is option C. DNESSEC.
By the use of public key cryptography to digitally sign authoritative zone data as it enters the DNS and then validate it at its destination, DNSSEC safeguards internet users and applications from altered domain name system (DNS) data.
Therefore, in the case above, Using public key cryptography-based digital signatures, DNSSEC reinforces DNS authentication. The DNS data itself is signed by the owner of the data with DNSSEC rather than the DNS queries and responses themselves being cryptographically signed. A public/private key pair exists for each DNS zone.
Learn more about DNS from
https://brainly.com/question/27960126
#SPJ1