An administrator has discovered numerous failed login attempts on a company's remote access portal and suspects it may be under a password attack. Which type of attack uses a list of commonly used passwords or phrases to gain unauthorized access and is likely occurring in this scenario?
IP spoofing
Man-in-the-middle attack
Rogue access point
Deauthentication attack
Dictionary attack
MAC filtering