EMET works on a per program basis. So, let's see what is exploitable: First on the list is your browser.
If you want strong exploit protection for your browser, you can sandbox it, for instance, with Sandboxie or with COMODO or with ReHIPS. All of these have free versions
If you run chrome on windows 10, you can enable appcontainer lockdown, which is good exploit protection.
Next on the list is your PDF reader. On windows 10, the default PDF reader is Edge, which runs in appcontainer. So you have exploit protection. Otherwise, use Sumatra as your default PDF reader. It is virtually unexploitable because it doesn't have the fancy features. When you need the fancy features for a trusted PDF doc that you already tested and you trust it, then you can use Adobe Reader or whatever.
Then comes MS Office. By default, Macros will not run in an Office doc unless you explicitly allow it to run. So you are protected from the common exploits.