This is nearly all systems, at least in practice. Network latency will probably limit you to a few hundred guesses a second at most.
It’s the leaked password hashes (of which there have been a number of recent cases) that are the problem, because crackers can put them on different hardware and get many, many more guesses per second in.
Actually, these are characters, not bits. Theoretically, ASCII allows at least 200 different characters, giving you 3e34 combinations. In practice, you can limit it to lower and upper case letters, numbers and a few symbols - giving about 80 possible characters and 4e28 combinations. This is still a lot more work than a dictionary attack.
That seems like a silly principle to me. How would an attacker know what scheme you used to construct your password, so long as it’s sufficiently uncommon (and you don’t go posting about it on the Internet)? It seems to me that a more reasonable principle would be “Your password should be secure against the sorts of attacks an attacker is actually likely to use.”
Suppose my password was my full name written out with the Alpha-Bravo-Charlie alphabet. (e.g. Tango-India-Mike-Three-One-Four, but obviously my real name is much longer). That’s completely insecure if you know what I’m doing, but in practice I think it’s far less likely to be cracked than something like C3cilRules!