Also, it wouldn't be much good against a dictionary attack.
Dictionary attacks are only effective against single words, common phrases/combinations, and simple character substitutions. The only scenario where they could be useful against a passphrase such as 'correcthorsebatterystaple' would be an offline, focused cracking attempt where the attacker already has reason to believe the hash they are trying to crack is such a phrase.
Extending the space to the whole of the English language, rather than just ~2000 common words, renders even that totally ineffective, because then the search space grows from powers of 2000 to powers of 200,000 (by extremely conservative definitions of 'word') or even millions. Again, that assumes the attacker even knows the password is made of English words.
So if you're making a password for nuclear missile launch controls and tell someone that the password is made entirely of common lowercase words, you probably have cause for concern.... but otherwise, a phrase like that is plenty good enough for most uses (assuming password rules allow it).
Unless you have a trivial password or an educated attacker, nobody is going to guess a login online unless the site doesn't implement any kind of lockout after X incorrect guesses. Online breaches are generally the result of social engineering first, malware second, and cracking a very distant third.
Realistically, the common scenario for password leaks these days is a database compromise (there have been a lot of high profile leaks since 2011 when that cartoon was made). In that case, the attackers are just going to crack the low-hanging-fruit (using mainly dictionary and min-length brute force attacks, less so pattern-based guessing) and just gather whatever information they can from the rest to use in other ways (spear phishing, etc.).