Her password's nine proper nouns long.
An attacker would have to guess that she had a penchant for such a password form and then deploy his proper noun dictionary against her, hoping all of her words were in his dictionary.
And that assumes an offline attack, where the attacker can brute-force at GPU speeds.
In a more realistic scenario, her server would impose increasing time penalties for incorrect guesses, thus rendering his attack hopeless immediately, even if he knew the form of her password, which, of course, he doesn't.
Words run-on like that are generally not found in dictionary attacks, because a dictionary attack will not know when a word has been found. There are no natural boundaries in that run-on list of character names. It's the same reason some password experts are now recommending run-on nonsense phrases which include proper names as the best most unbreakable passwords.