An administrator has discovered numerous failed login attempts on a company's remote access portal and suspects it may be under a password attack. Which type of attack uses a list of commonly used passwords or phrases to gain unauthorized access and is likely occurring in this scenario?
MAC filtering
Rogue access point
IP spoofing
Man-in-the-middle attack
Deauthentication attack
Dictionary attack