Contrary to the originally accepted answer, a random multiword passphrase is not subject to what we usually mean when we say "dictionary attack" (that's when you just throw a large wordlist at a hash, one line at a time, maybe with a few rules thrown in). Such a simple attack would have no effect on a solid Diceware passphrase. Your seven-word Diceware-based example above, if truly randomly generated, would be randomly located in a pool of 1.7x10^27 possibilities (we often use "keyspace" as shorthand for this).
This keyspace is roughly the equivalent of a 13-character password randomly generated from the entire 95-character printable ASCII character set. Even if the password hashing method was a very fast hash (such as MD5), a 10^27 password cannot be exhausted simply by renting a few (or a few racks) of GPUs.
If this seems counter-intuitive, I encourage you to do the math. If you calculate how long it would take to exhaust a 10^27 space - see this excellent Jeremi Gosney rant on Twitter - then unless the NSA is after you (in which case, they're not going to bother with your WPA2 passphrase), either of these password methods are more than sufficient ... even if your password is stored using a really fast/bad hash like MD5.
But in this case, we're not talking about MD5. We're talking about WPA2, for which cracking speeds are much slower - for example, on the order of 2.5 million hashes per second on a 6x 1080 GPU rig. That may sound fast, but again - do the math. Even if you assume capabilities of a trillion passwords per second (nation-state grade, which would be silly, as noted above) ... it would still take 10^27 / (1000000000000 * 60 * 60 * 24 * 365) or on the order of 10^7 or 10,000,000 years to fully exhaust the keyspace.
Your seven-word Diceware passphrase is not even faintly vulnerable to a "dictionary attack". You could literally tell a professional password cracker with a roomful of GPUs exactly which dictionary you used, what the separator is, that they're all lower case, and that there are seven words in the passphrase ... and they wouldn't be able to crack that WPA2 in your lifetime.
And even if I made three major errors in this math (which is likely, since I'm typing fast) ... and even if each of those errors makes my math off by an order of magnitude ... that's still 10,000 years.
Diceware passwords are considered to be strong for a good reason: the math doesn't lie. (And they're great for WPA2 because they're easy to type into all the weird wireless gear you have in your life.)