100+ Free GREM Practice Questions
Pass your GIAC Reverse Engineering Malware (GREM) exam on the first try — instant access, no signup required.
Which file format identifier (magic bytes) at offset 0 indicates a Windows Portable Executable (PE) file?
Key Facts: GREM Exam
75
Questions
GIAC
73%
Passing Score
GIAC
180 min
Duration
GIAC
$979
Exam Fee
GIAC (retake)
4 years
Validity
GIAC
Open Book
Format
Index-based
GREM validates advanced malware reverse engineering skills. The exam has 75 questions in 3 hours with a 73% passing score. Topics include static analysis (IDA Pro, Ghidra, PEview), dynamic analysis (FakeNet-NG, Process Monitor, Noriben, INetSim), x86/x64 assembly, unpacking (OllyDbg, x64dbg), anti-analysis bypass, malicious document triage (oletools, olevba), JavaScript de-obfuscation (box-js, malware-jail), shellcode analysis (scdbg, speakeasy), .NET reverse engineering (dnSpy), and YARA rule writing. GREM is open book (index-based) and valid 4 years.
Sample GREM Practice Questions
Try these sample questions to test your GREM exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.
1Which file format identifier (magic bytes) at offset 0 indicates a Windows Portable Executable (PE) file?
2Which tool is designed to identify packers, compilers, and protectors used on a PE file by analyzing signatures and entropy?
3When performing manual UPX unpacking in x64dbg, which technique uses the stack pointer to locate the Original Entry Point (OEP)?
4Which command-line tool from the oletools suite is specifically designed to extract and analyze VBA macros from Office documents?
5In x86 assembly, which calling convention passes the first argument via ECX and is used for C++ instance methods on Microsoft compilers?
6Which FakeNet-NG feature allows malware to 'see' responses from fake services like DNS, HTTP, and SMTP while preventing actual network egress?
7Which Volatility 3 plugin lists currently running processes with PID, PPID, and command line from a Windows memory image?
8What is the purpose of API hashing in malware?
9Which YARA condition would match a file whose size is less than 500KB AND contains the string 'evil'?
10Which disassembler/decompiler is developed and released by the NSA as an open-source alternative to IDA Pro?
About the GREM Exam
The GIAC Reverse Engineering Malware (GREM) certification validates advanced skills in analyzing malicious software targeting Windows systems. It covers static and dynamic analysis, x86/x64 assembly interpretation, unpacking, anti-analysis bypass, malicious document triage, JavaScript and shellcode analysis, .NET reverse engineering, and YARA authoring. Based on SANS FOR610 training.
Questions
75 scored questions
Time Limit
180 minutes
Passing Score
73%
Exam Fee
$979 (GIAC (SANS) / ProctorU)
GREM Exam Content Outline
Malware Analysis Fundamentals & Lab Setup
Isolated lab architecture, snapshots, network simulation (INetSim, FakeNet-NG), Windows and Linux analysis VMs, behavioral vs code analysis approaches, triage workflow, sample handling, and hashing (MD5/SHA-256)
Static Analysis of Windows Executables
PE file structure, sections, imports/exports, strings, Detect It Easy (DiE), PEview, CFF Explorer, PE-bear, IDA Pro, Ghidra, x86/x64 disassembly, cross-references, control flow graphs, and identifying malicious indicators
Dynamic Behavioral Analysis
Process Monitor, Process Hacker/Explorer, Regshot, Noriben, API Monitor, Wireshark, FakeNet-NG, ApateDNS, network simulation, registry and file system monitoring, and correlating host and network indicators
x86/x64 Assembly for Reverse Engineers
Registers, stack frames, calling conventions (stdcall, cdecl, fastcall, x64), common opcodes, conditional branching, loops, function prologue/epilogue, and recognizing compiler idioms
Anti-Analysis, Unpacking & Obfuscation
Anti-debug, anti-VM, anti-sandbox checks, timing and process tricks, packers (UPX, Themida, VMProtect, ASPack), manual unpacking with OllyDbg/x64dbg, ESP trick, scripted unpackers, and obfuscation patterns
Malicious Document & Script Analysis
OLE compound documents, oletools (olevba, oleid, olemap), VBA macro analysis, PDF triage (peepdf, pdfid, pdf-parser), JavaScript de-obfuscation (box-js, malware-jail, jsunpack), HTA, LNK, and ISO/IMG container abuse
Shellcode & Browser Exploit Analysis
Shellcode disassembly, scdbg emulation, blobrunner, speakeasy, position-independent code, egg hunters, API hashing, exploit kits, drive-by downloads, and CVE-mapped analyst workflow
.NET and Managed Malware Reverse Engineering
dnSpy, ILSpy, dotPeek, IL analysis, de-obfuscation of ConfuserEx/de4dot, managed-to-native transitions, string decryption routines, and typical .NET loader patterns
YARA Rules & Threat Hunting
YARA syntax, strings and conditions, modules (pe, hash, math), rule optimization, retro-hunting, attribution, and integrating YARA with IR workflows
How to Pass the GREM Exam
What You Need to Know
- Passing score: 73%
- Exam length: 75 questions
- Time limit: 180 minutes
- Exam fee: $979
Keys to Passing
- Complete 500+ practice questions
- Score 80%+ consistently before scheduling
- Focus on highest-weighted sections
- Use our AI tutor for tough concepts
GREM Study Tips from Top Performers
Frequently Asked Questions
What is the GIAC GREM exam format?
The GIAC GREM exam consists of 75 questions with a 180-minute (3-hour) time limit. The passing score is 73%. Questions include multiple choice and may include CyberLive hands-on practical components. The exam is open book — candidates can reference printed notes and an index. It is delivered via ProctorU online or Pearson VUE onsite.
How does GREM differ from GCIH and GCFA?
GCIH focuses on incident handling, GCFA on host forensics (including some memory and malware triage), and GREM on deep malware reverse engineering. GREM goes much deeper into assembly, unpacking, and code-level analysis than the other two. It is typically taken after candidates already hold GCIH or GCFA and want to specialize in malware analysis.
What tools are covered in the GREM exam?
Core tools include IDA Pro, Ghidra, x64dbg, OllyDbg, PEview, Detect It Easy, Process Monitor, Process Hacker, Regshot, Noriben, FakeNet-NG, INetSim, ApateDNS, oletools (olevba), box-js, malware-jail, scdbg, speakeasy, dnSpy, ILSpy, and YARA. Candidates should be comfortable pivoting between static and dynamic analysis workflows.
Is GREM open book?
Yes. Like other GIAC certifications, GREM is open book. Candidates are allowed to bring printed notes and reference materials into the exam. Building a well-indexed reference is a major study activity. No electronic devices (laptops, tablets, phones) are permitted during the exam.
What are the GREM renewal requirements?
GIAC certifications are valid for 4 years. Renewal requires earning 36 CPE credits or retaking the current version of the exam, plus paying a renewal fee ($479 as of 2026). CPEs can be earned through SANS training, publishing research, conference attendance, and relevant work experience.
How long should I study for GREM?
Plan for 120-180 hours of study over 8-12 weeks. Most candidates take SANS FOR610 first (6 days). Allocate significant time to hands-on labs: static analysis of benign and malicious binaries, unpacking UPX/Themida samples, JavaScript de-obfuscation, and writing YARA rules. A strong reverse engineering background shortens the timeline.
What jobs can I get with GREM certification?
GREM qualifies you for specialized roles: Malware Analyst ($100,000-160,000), Reverse Engineer ($110,000-170,000), Threat Researcher ($110,000-175,000), SOC Tier 3 ($100,000-150,000), and Incident Response Specialist ($100,000-160,000). It is widely required at threat intelligence vendors, government agencies, and large enterprises with dedicated malware analysis teams.